-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2018.0136
          Multiple vulnerabilities have been identified in McAfee
                           ePolicy Orchestrator.
                               18 June 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              McAfee ePolicy Orchestrator
Operating System:     Windows
                      UNIX variants (UNIX, Linux, OSX)
Impact/Access:        Access Confidential Data -- Existing Account            
                      Reduced Security         -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2018-6672 CVE-2018-6671 
Member content until: Wednesday, July 18 2018

OVERVIEW

        Multiple vulnerabilities have been identified in McAfee ePolicy 
        Orchestrator. [1]
        
        The following versions are affected:
            ePO 5.3.3, 5.3.2, 5.3.1, and 5.3.0
            ePO 5.9.1 and 5.9.0


IMPACT

        The vendor has provided the following details regarding the 
        vulnerabilities:
        
        "CVE-2018-6671   
        Application protections bypass vulnerability in McAfee ePolicy 
        Orchestrator (ePO) 5.3.0 through 5.3.3 and 5.9.0 through 5.9.1 allows
        remote authenticated users to bypass localhost only access security
        protection for some ePO features via a specially crafted HTTP request.
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6671
             
        CVE-2018-6672
        Information disclosure vulnerability in McAfee ePolicy Orchestrator 
        (ePO) 5.3.0 through 5.3.3 and 5.9.0 through 5.9.1 allows authenticated
        users to view sensitive information in plain text format via
        unspecified vectors.
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6672" [1]


MITIGATION

        McAfee advises upgrading to the latest releases below to fix these issues:
        
            McAfee recommends that users of ePO 5.3.2 or earlier upgrade to 
            ePO 5.3.3 or 5.9.1 and apply EPO5xHF1229850.
            McAfee recommends that users of ePO 5.3.3 apply EPO5xHF1229850.
            McAfee recommends that users of ePO 5.9.0 upgrade to ePO 5.9.1 and 
            apply EPO5xHF1229850.
            McAfee recommends that users of ePO 5.9.1 apply EPO5xHF1229850.
         


REFERENCES

        [1] McAfee Security Bulletin - ePolicy Orchestrator update fixes
            possible localhost only access bypass and sensitive information
            leak vulnerability (CVE-2018-6671 and CVE-2018-6672)
            https://kc.mcafee.com/corporate/index?page=content&id=SB10240

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=j/QR
-----END PGP SIGNATURE-----