First published: Tue Mar 14 2017(Updated: )
Authentication bypass by spoofing vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote unauthenticated attacker to execute arbitrary code or cause a denial of service via a crafted authentication cookie.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee VirusScan Enterprise | <=2.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8022 is considered a critical vulnerability due to its potential to allow remote unauthorized access and execution of arbitrary code.
To fix CVE-2016-8022, upgrade to Intel Security VirusScan Enterprise Linux version 2.0.4 or later.
The potential impacts of CVE-2016-8022 include arbitrary code execution and denial of service for the affected systems.
CVE-2016-8022 affects users of Intel Security VirusScan Enterprise Linux version 2.0.3 and earlier.
Yes, CVE-2016-8022 can be exploited remotely by an unauthenticated attacker.