Vulnerability Note VU#118388
Symantec Scan Engine fails to properly perform authentication
Symantec Scan Engine administrative web interface fails to properly authenticate users, which may allow a remote attacker to gain administrative access to the software.
The Symantec Scan Engine provides a programming interface to Symantec content scanning and virus detection services. The Symantec Scan Engine includes an administrative interface that is enabled and listening on port 8004/tcp by default.
The web interface to Symantec Scan Engine uses a client-side Java applet to perform authentication. No authentication is performed on the server side.
A remote, unauthenticated attacker may be able to gain access to the Symantec Scan Engine software. At the time of publication of this document, exploit code to remotely change the administrator password is available.
Apply an update
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Symantec, Inc.||Affected||-||01 May 2006|
CVSS Metrics (Learn More)
This vulnerability was disclosed by Symantec, who in turn credit Rapid7 with reporting the issue.
This document was written by Will Dormann.
- CVE IDs: CVE-2006-0230
- Date Public: 21 Apr 2006
- Date First Published: 01 May 2006
- Date Last Updated: 01 May 2006
- Severity Metric: 27.00
- Document Revision: 4
If you have feedback, comments, or additional information about this vulnerability, please send us email.