Vulnerability Details : CVE-2015-3326
Trend Micro ScanMail for Microsoft Exchange (SMEX) 10.2 before Hot Fix Build 3318 and 11.0 before Hot Fix Build 4180 creates session IDs for the web console using a random number generator with predictable values, which makes it easier for remote attackers to bypass authentication via a brute force attack.
Exploit prediction scoring system (EPSS) score for CVE-2015-3326
Probability of exploitation activity in the next 30 days: 0.29%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 65 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2015-3326
| Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|
|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
nvd@nist.gov |
References for CVE-2015-3326
-
http://www.securityfocus.com/bid/74661
Trend Micro ScanMail for Microsoft Exchange Predictable Random Number Generator Weakness
-
http://www.securitytracker.com/id/1032323
Trend Micro ScanMail for Microsoft Exchange Weak Session ID Generation Lets Remote Users Hijack Sessions - SecurityTracker
-
http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3326.html
TrendMicro ScanMail for Microsoft Exchange (SMEX) predictable session token - CVE-2015-3326
-
http://esupport.trendmicro.com/solution/en-US/1109669.aspx
Session ID is vulnerable to remote attacker - ScanMail for ExchangeVendor Advisory
Products affected by CVE-2015-3326
- cpe:2.3:a:trend_micro:scanmail:11.0:*:*:*:*:microsoft_exchange:*:*
- cpe:2.3:a:trend_micro:scanmail:10.2:*:*:*:*:microsoft_exchange:*:*