First published: Thu May 14 2015(Updated: )
Trend Micro ScanMail for Microsoft Exchange (SMEX) 10.2 before Hot Fix Build 3318 and 11.0 before Hot Fix Build 4180 creates session IDs for the web console using a random number generator with predictable values, which makes it easier for remote attackers to bypass authentication via a brute force attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro ScanMail for Microsoft Exchange | =10.2 | |
Trend Micro ScanMail for Microsoft Exchange | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3326 has a medium severity rating due to the potential for remote attackers to bypass authentication.
To fix CVE-2015-3326, update Trend Micro ScanMail for Microsoft Exchange to version 10.2 Hot Fix Build 3318 or 11.0 Hot Fix Build 4180 or later.
CVE-2015-3326 affects Trend Micro ScanMail for Microsoft Exchange versions 10.2 prior to Hot Fix Build 3318 and 11.0 prior to Hot Fix Build 4180.
CVE-2015-3326 allows remote attackers to perform brute force attacks to bypass authentication due to predictable session IDs.
There is no official workaround for CVE-2015-3326, and it is recommended to apply the necessary updates to mitigate the vulnerability.