First published: Fri Jan 13 2017(Updated: )
A spoofing vulnerability in the Core of BlackBerry Enterprise Server (BES) 12 through 12.5.2 allows remote attackers to enroll an illegitimate device to the BES, gain access to device parameters for the BES, or send false information to the BES by gaining access to specific information about a device that was legitimately enrolled on the BES.
Credit: secure@blackberry.com
Affected Software | Affected Version | How to fix |
---|---|---|
Blackberry Enterprise Service | =12.0.0 | |
Blackberry Enterprise Service | =12.0.1 | |
Blackberry Enterprise Service | =12.1.0 | |
Blackberry Enterprise Service | =12.2.0 | |
Blackberry Enterprise Service | =12.2.1 | |
Blackberry Enterprise Service | =12.3.0 | |
Blackberry Enterprise Service | =12.3.1 | |
Blackberry Enterprise Service | =12.4.0 | |
Blackberry Enterprise Service | =12.4.1 | |
Blackberry Enterprise Service | =12.5.0a | |
Blackberry Enterprise Service | =12.5.1 | |
Blackberry Enterprise Service | =12.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.