First published: Thu May 11 2017(Updated: )
Symantec Advanced Secure Gateway (ASG) 6.6 prior to 6.6.5.13, ASG 6.7 prior to 6.7.3.1, ProxySG 6.5 prior to 6.5.10.6, ProxySG 6.6 prior to 6.6.5.13, and ProxySG 6.7 prior to 6.7.3.1 are susceptible to an information disclosure vulnerability. An attacker with local access to the client host of an authenticated administrator user can, under certain circumstances, obtain sensitive authentication credential information.
Credit: secure@symantec.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Symantec Advanced Secure Gateway | >=6.6<6.6.5.13 | |
Broadcom Symantec Advanced Secure Gateway | >=6.7<6.7.3.1 | |
Broadcom ProxySG | >=6.5<6.5.10.6 | |
Broadcom ProxySG | >=6.6<6.6.5.13 | |
Broadcom ProxySG | >=6.7<6.7.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9100 is considered a medium severity vulnerability due to its potential for information disclosure.
To remediate CVE-2016-9100, update the Symantec Advanced Secure Gateway or ProxySG to the latest version as specified in the security advisory.
CVE-2016-9100 affects Broadcom Symantec Advanced Secure Gateway versions prior to 6.6.5.13 and 6.7.3.1, as well as ProxySG versions prior to 6.5.10.6, 6.6.5.13, and 6.7.3.1.
CVE-2016-9100 facilitates information disclosure attacks by allowing unauthorized access to sensitive information on the system.
CVE-2016-9100 requires local access to the client host, making it not remotely exploitable.