First published: Sat May 30 2015(Updated: )
The WebUI component in Blue Coat SSL Visibility Appliance SV800, SV1800, SV2800, and SV3800 3.6.x through 3.8.x before 3.8.4 does not set the secure flag for the administrator's cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session, a different vulnerability than CVE-2015-4138.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bluecoat Ssl Visibility Appliance Sv800 Firmware | <=3.8.3 | |
Broadcom SSL Visibility Appliance | ||
Broadcom SSL Visibility Appliance | <=3.8.3 | |
Blue Coat SSL Visibility Appliance SV1800 Firmware | ||
Broadcom SSL Visibility Appliance | <=3.8.3 | |
Blue Coat SSL Visibility Appliance SV3800 Firmware | ||
Blue Coat SSL Visibility Appliance SV2800 | <=3.8.3 | |
Blue Coat SSL Visibility Appliance SV2800 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2855 is classified as a medium severity vulnerability due to the ease of cookie interception by remote attackers.
To fix CVE-2015-2855, upgrade the Blue Coat SSL Visibility Appliance firmware to version 3.8.4 or later.
CVE-2015-2855 can potentially allow remote attackers to capture administrator cookies and gain unauthorized access.
CVE-2015-2855 affects the Blue Coat SSL Visibility Appliance models SV800, SV1800, SV2800, and SV3800 running firmware 3.6.x through 3.8.3.
Currently, there are no documented workarounds for CVE-2015-2855 apart from upgrading to the latest firmware.