First published: Tue Mar 14 2017(Updated: )
SQL injection vulnerability in core services in Intel Security McAfee ePolicy Orchestrator (ePO) 5.3.2 and earlier and 5.1.3 and earlier allows attackers to alter a SQL query, which can result in disclosure of information within the database or impersonation of an agent without authentication via a specially crafted HTTP post.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trellix ePolicy Orchestrator | >=5.1.0<=5.1.3 | |
Trellix ePolicy Orchestrator | >=5.3.0<=5.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8027 has a high severity rating due to the potential for SQL injection attacks that can compromise database confidentiality.
To fix CVE-2016-8027, update Intel Security McAfee ePolicy Orchestrator to version 5.3.3 or later, or 5.1.4 or later.
CVE-2016-8027 affects Intel Security McAfee ePolicy Orchestrator versions 5.3.2 and earlier and 5.1.3 and earlier.
CVE-2016-8027 allows attackers to perform SQL injection, which can lead to unauthorized access to database information or impersonation of agents.
While the best course of action is to update, disabling certain features or restricting database access may serve as temporary mitigations for CVE-2016-8027.