First published: Fri Jan 09 2015(Updated: )
McAfee ePolicy Orchestrator (ePO) before 4.6.9 and 5.x before 5.1.2 uses the same secret key across different customers' installations, which allows attackers to obtain the administrator password by leveraging knowledge of the encrypted password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trellix ePolicy Orchestrator | <=4.6.8 | |
Trellix ePolicy Orchestrator | =5.0.0 | |
Trellix ePolicy Orchestrator | =5.0.1 | |
Trellix ePolicy Orchestrator | =5.1.0 | |
Trellix ePolicy Orchestrator | =5.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0922 has a medium severity rating, indicating a potential risk to affected systems.
To fix CVE-2015-0922, update McAfee ePolicy Orchestrator to version 4.6.9 or 5.1.2 or higher.
CVE-2015-0922 affects ePolicy Orchestrator versions prior to 4.6.9 and 5.x versions prior to 5.1.2.
CVE-2015-0922 can be exploited by attackers to obtain the administrator password through knowledge of the encrypted password.
There are no documented workarounds for CVE-2015-0922; updating to a secure version is necessary.