Vulnerability Details : CVE-2016-7955
The logcheck function in session.inc in AlienVault OSSIM before 5.3.1, when an action has been created, and USM before 5.3.1 allows remote attackers to bypass authentication and consequently obtain sensitive information, modify the application, or execute arbitrary code as root via an "AV Report Scheduler" HTTP User-Agent header.
Vulnerability category: Execute code
Products affected by CVE-2016-7955
- cpe:2.3:a:alienvault:ossim:*:*:*:*:*:*:*:*
- cpe:2.3:a:alienvault:unified_security_management:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-7955
2.56%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 90 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-7955
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2016-7955
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-7955
-
http://www.securityfocus.com/archive/1/540224/100/0/threaded
SecurityFocus
-
https://www.alienvault.com/forums/discussion/7765/alienvault-v5-3-1-hotfix
AlienVault v5.3.1 Hotfix | AT&T CybersecurityVendor Advisory
-
http://www.zerodayinitiative.com/advisories/ZDI-16-517/
ZDI-16-517 | Zero Day InitiativeThird Party Advisory;VDB Entry
Jump to