Vulnerability Description
Trend Micro ScanMail for Microsoft Exchange (SMEX) 10.2 before Hot Fix Build 3318 and 11.0 before Hot Fix Build 4180 creates session IDs for the web console using a random number generator with predictable values, which makes it easier for remote attackers to bypass authentication via a brute force attack.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trend Micro | Scanmail | 10.2 |
References
- http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3
- http://esupport.trendmicro.com/solution/en-US/1109669.aspxVendor Advisory
- http://www.securityfocus.com/bid/74661
- http://www.securitytracker.com/id/1032323
- http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3
- http://esupport.trendmicro.com/solution/en-US/1109669.aspxVendor Advisory
- http://www.securityfocus.com/bid/74661
- http://www.securitytracker.com/id/1032323
FAQ
What is CVE-2015-3326?
CVE-2015-3326 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Trend Micro ScanMail for Microsoft Exchange (SMEX) 10.2 before Hot Fix Build 3318 and 11.0 before Hot Fix Build 4180 creates session IDs for the web console using a random number generator with predic...
How severe is CVE-2015-3326?
CVE-2015-3326 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-3326?
Check the references section above for vendor advisories and patch information. Affected products include: Trend Micro Scanmail.