First published: Wed Jan 09 2019(Updated: )
Improper input validation in the proxy component of McAfee Web Gateway 7.8.2.0 and later allows remote attackers to cause a denial of service via a crafted HTTP request parameter.
Credit: psirt@mcafee.com trellixpsirt@trellix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mcafee Mcafee Web Gateway | >=7.8.2.0<7.8.2.5 | |
Mcafee Mcafee Web Gateway | >=8.0.0.0<8.0.2.0 | |
>=7.8.2.0<7.8.2.5 | ||
>=8.0.0.0<8.0.2.0 |
Update to MWG 7.8.2.5 or 8.0.2
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3581 is considered a high severity vulnerability due to its potential to cause a denial of service.
CVE-2019-3581 affects McAfee Web Gateway versions 7.8.2.0 to 7.8.2.5 and 8.0.0.0 to 8.0.2.0.
To mitigate CVE-2019-3581, update McAfee Web Gateway to a version that is not affected, specifically later than 7.8.2.5 or 8.0.2.0.
CVE-2019-3581 is caused by improper input validation in the proxy component of McAfee Web Gateway.
Yes, CVE-2019-3581 can be exploited remotely through crafted HTTP request parameters.