CVE-2016-7955

Published on: 03/15/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:06 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Ossim from Alienvault contain the following vulnerability:

The logcheck function in session.inc in AlienVault OSSIM before 5.3.1, when an action has been created, and USM before 5.3.1 allows remote attackers to bypass authentication and consequently obtain sensitive information, modify the application, or execute arbitrary code as root via an "AV Report Scheduler" HTTP User-Agent header.

  • CVE-2016-7955 has been assigned by [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
AlienVault v5.3.1 Hotfix - AlienVault Product Forums Vendor Advisory
www.alienvault.com
text/html
URL Logo CONFIRM www.alienvault.com/forums/discussion/7765/alienvault-v5-3-1-hotfix
Zero Day Initiative Third Party Advisory
VDB Entry
www.zerodayinitiative.com
text/html
URL Logo MISC www.zerodayinitiative.com/advisories/ZDI-16-517/
SecurityFocus www.securityfocus.com
text/x-python
BUGTRAQ 20170306 CVE-2016-7955 - Alienvault OSSIM/USM Authentication Bypass

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationAlienvaultOssimAllAllAllAll
ApplicationAlienvaultUnified Security ManagementAllAllAllAll
  • cpe:2.3:a:alienvault:ossim:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:alienvault:unified_security_management:*:*:*:*:*:*:*:*: