Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2018.0136 Multiple vulnerabilities have been identified in McAfee ePolicy Orchestrator. 18 June 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: McAfee ePolicy Orchestrator Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Access Confidential Data -- Existing Account Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2018-6672 CVE-2018-6671 Member content until: Wednesday, July 18 2018 OVERVIEW Multiple vulnerabilities have been identified in McAfee ePolicy Orchestrator. [1] The following versions are affected: ePO 5.3.3, 5.3.2, 5.3.1, and 5.3.0 ePO 5.9.1 and 5.9.0 IMPACT The vendor has provided the following details regarding the vulnerabilities: "CVE-2018-6671 Application protections bypass vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.0 through 5.3.3 and 5.9.0 through 5.9.1 allows remote authenticated users to bypass localhost only access security protection for some ePO features via a specially crafted HTTP request. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6671 CVE-2018-6672 Information disclosure vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.0 through 5.3.3 and 5.9.0 through 5.9.1 allows authenticated users to view sensitive information in plain text format via unspecified vectors. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6672" [1] MITIGATION McAfee advises upgrading to the latest releases below to fix these issues: McAfee recommends that users of ePO 5.3.2 or earlier upgrade to ePO 5.3.3 or 5.9.1 and apply EPO5xHF1229850. McAfee recommends that users of ePO 5.3.3 apply EPO5xHF1229850. McAfee recommends that users of ePO 5.9.0 upgrade to ePO 5.9.1 and apply EPO5xHF1229850. McAfee recommends that users of ePO 5.9.1 apply EPO5xHF1229850. REFERENCES [1] McAfee Security Bulletin - ePolicy Orchestrator update fixes possible localhost only access bypass and sensitive information leak vulnerability (CVE-2018-6671 and CVE-2018-6672) https://kc.mcafee.com/corporate/index?page=content&id=SB10240 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWydM4WaOgq3Tt24GAQiILhAAxJrvGldrAO6HxBqsRZIScll40ssY5o+S BpWxTn+fRwW/SqPpMzMJd2DJX4YN9xUW66UCOIQihGuygQE9DrBuOSSwiQ4g4YnW Gf0FWJGEEULJXDGsvTjG1Vb43MfZzgYZRuOCPMtEQet1jxK201MXw4mbF6cZlQdp MukpwC2AhEEp+qSeH7jLAj/2/pIV46k+E324ezMr20FxCJ8m8Uv6R6/63AOT4UVj jnL3A3GFcDOg/dMwb5WL3hiELvQSQsxHWiFL9NFnMSTGQU9xHSgAjtRbT2lY4XKq IJrD631o+AtTu3bTdgsmls2IX8mXbEIR10ResTIcxCEcFQ5lfbnnj9LRAW4LSmDF poZyoleeDoviOTOSWJ9fFA5KlWvbUvlugFEywMjy28d4bJSkc/CsiUr/qyu7DM25 HO603IwLk4veZKHNCFrbAp95JnS0+S3S67M8gFW7W5JxXTmjfanjt7/N0XSw5Gwb 2LXnAhxl6E2xrRs+NDrye/gsDzTqWA5lmACThFYmOzwDYYIIshCj7dLH5tOlvMhw imne3UNP78+JgGa1SttpqakPivBvz2p91Zmj7mRPQXnQJwE0tz9cPiElPcpR7Wtq eps+r+Vjy5ywQjL9RuH2C28rXyPh/f3VV+VCE+9OR2NgX+Ru5VttCGse9Cp9OeJx VU1x0LQVxBs= =j/QR -----END PGP SIGNATURE-----