Vulnerability Details : CVE-2008-2433
The web management console in Trend Micro OfficeScan 7.0 through 8.0, Worry-Free Business Security 5.0, and Client/Server/Messaging Suite 3.5 and 3.6 creates a random session token based only on the login time, which makes it easier for remote attackers to hijack sessions via brute-force attacks. NOTE: this can be leveraged for code execution through an unspecified "manipulation of the configuration."
Products affected by CVE-2008-2433
- cpe:2.3:a:trendmicro:officescan:*:*:*:*:*:*:*:*
- cpe:2.3:a:trendmicro:worry-free_business_security:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:trendmicro:client_server_messaging_suite:3.5:*:*:*:*:*:*:*
- cpe:2.3:a:trendmicro:client_server_messaging_suite:3.6:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-2433
29.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-2433
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | 2024-02-14 |
CWE ids for CVE-2008-2433
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
-
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-2433
-
http://www.securityfocus.com/archive/1/495670/100/0/threaded
Broken Link;Third Party Advisory;VDB Entry
-
http://www.securitytracker.com/id?1020732
GoDaddy Domain Name SearchBroken Link;Third Party Advisory;VDB Entry
-
http://securityreason.com/securityalert/4191
Trend Micro Products Web Management Authentication Bypass - CXSecurity.comBroken Link
-
http://www.vupen.com/english/advisories/2008/2421
Webmail: access your OVH emails on ovhcloud.com | OVHcloudBroken Link
-
http://secunia.com/advisories/31373
About Secunia Research | FlexeraBroken Link;Patch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/44597
Multiple Trend Micro products session token security bypass CVE-2008-2433 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://www.trendmicro.com/ftp/documentation/readme/Readme_WFBS5%200_EN_CriticalPatch1404.txt
Vendor Advisory
-
http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2402_readme.txt
Vendor Advisory
-
http://secunia.com/secunia_research/2008-31/advisory/
About Secunia Research | FlexeraBroken Link;Vendor Advisory
-
http://www.securityfocus.com/bid/30792
Broken Link;Third Party Advisory;VDB Entry
Jump to