First published: Sat May 30 2015(Updated: )
Session fixation vulnerability in the WebUI component in Blue Coat SSL Visibility Appliance SV800, SV1800, SV2800, and SV3800 3.6.x through 3.8.x before 3.8.4 allows remote attackers to hijack web sessions by providing a session ID.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom SSL Visibility Appliance | <=3.8.3 | |
Blue Coat SSL Visibility Appliance SV3800 Firmware | ||
Blue Coat SSL Visibility Appliance SV2800 | <=3.8.3 | |
Blue Coat SSL Visibility Appliance SV2800 Firmware | ||
Broadcom SSL Visibility Appliance | <=3.8.3 | |
Blue Coat SSL Visibility Appliance SV1800 Firmware | ||
Bluecoat Ssl Visibility Appliance Sv800 Firmware | <=3.8.3 | |
Broadcom SSL Visibility Appliance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2853 has a high severity rating due to the potential for remote attackers to hijack web sessions.
To resolve CVE-2015-2853, upgrade the Blue Coat SSL Visibility Appliance firmware to version 3.8.4 or later.
CVE-2015-2853 affects the Blue Coat SSL Visibility Appliance models SV800, SV1800, SV2800, and SV3800 running firmware versions 3.6.x to 3.8.3.
CVE-2015-2853 allows attackers to conduct session fixation attacks, potentially taking control of user sessions.
Session fixation in CVE-2015-2853 refers to a vulnerability where attackers can set a specific session ID, enabling them to hijack user sessions.