Operating System:

[Win]

Published:

06 November 2017

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2017.0188
  A vulnerability has been identified in McAfee Network Security Manager
                              6 November 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              McAfee Network Security Manager
Operating System:     Windows
Impact/Access:        Increased Privileges -- Existing Account
Resolution:           Patch/Upgrade
CVE Names:            CVE-2016-8029  
Member content until: Wednesday, December  6 2017

OVERVIEW

        A vulnerability has been identified in McAfee Network Security 
        Manager prior to versions 8.3.7.64 and 9.1.7.11. [1]


IMPACT

        The vendor has provided the following details regarding the 
        vulnerabilities:
        
        "CVE-2016-8029 Exploitation of authorization vulnerability in the 
        web interface in McAfee Network Security Manager (NSM) in all 
        versions before 8.2.7.71.1 allows authenticated users to gain 
        elevated privileges via a crafted HTTP request parameter." [1]


MITIGATION

        McAfee recommends users upgrade to the latest versions outlined in 
        the table below. [1]
        
        "NSM Software	Type			Version				Release Date
         8.1		N/A			Upgrade to version 9.1.	 
         8.3		Maintenance Release 3	8.3.7.64			October 31, 2017
         9.1		General Availability	9.1.7.11			July 13, 2017" [1]


REFERENCES

        [1] McAfee Security Bulletin - Network Security Manager update fixes
            exploitation of authorization vulnerability in the web interface
            (CVE-2016-8029)
            https://kc.mcafee.com/corporate/index?page=content&id=SB10210

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=T7Rv
-----END PGP SIGNATURE-----