Page 2 of 7 results (0.003 seconds)

CVSS: 3.5EPSS: 0%CPEs: 2EXPL: 0

McAfee Enterprise Mobility Manager (EMM) Agent before 4.8 and Server before 10.1, when one-time provisioning (OTP) mode is enabled, have an improper dependency on DNS SRV records, which makes it easier for remote attackers to discover user passwords by spoofing the EMM server, as demonstrated by a password entered on an iOS device. McAfee Enterprise Mobility Manager (EMM) Agent antes de v4.8 y EMM Server antes de v10.1, cuando está habilitado el modo OTP, tienen una dependencia en registros SRV de DNS, lo que hace que sea más fácil descubrir contraseñas de usuario a atacantes remotos haciendo un ataque de spoofing del servidor EMM, tal y como lo demuestra una contraseña escrita en un dispositivo iOS. • https://exchange.xforce.ibmcloud.com/vulnerabilities/78130 https://kc.mcafee.com/corporate/index?page=content&id=SB10021 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

The Portal in McAfee Enterprise Mobility Manager (EMM) before 10.0 does not set the secure flag for the ASP.NET session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. Portal en McAfee Enterprise Mobility Manager (EMM) anteriores a v10.0 no fija el "flag" de seguridad para la cookie de sesión para ASP.NET en una sesión https, lo que facilita a atacantes remotos capturar esta cookie interceptando su transmisión en la sesión http. • https://exchange.xforce.ibmcloud.com/vulnerabilities/78220 https://kc.mcafee.com/corporate/index?page=content&id=SB10022 •