// For flags

CVE-2018-7675

Potential Information Disclosure in Sentinel

Severity Score

5.3
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

In NetIQ Sentinel before 8.1.x, a Sentinel user is logged into the Sentinel Web Interface. After performing some tasks within Sentinel the user does not log out but does go idle for a period of time. This in turn causes the interface to timeout so that it requires the user to re-authenticate. If another user is passing by and decides to login, their credentials are accepted. While The user does not inherit any of the other users privileges, they are able to view the previous screen. In this case it is possible that the user can see another users events or configuration information for whatever view is currently showing.

En NetIQ Sentinel, en versiones anteriores a la 8.1.x, un usuario de Sentinel inicia sesión en la interfaz web de Sentinel. Tras realizar algunas tareas en Sentinel, el usuario no cierra sesión, sino que se vuelve inactivo durante un tiempo. Esto provoca que la interfaz agote el tiempo de sesión activa y requiera que el usuario se vuelva a autenticar. Si otro usuario decide iniciar sesión, sus credenciales se aceptarán. Aunque el usuario no hereda ningún privilegio del otro usuario, puede ver la pantalla anterior. En este caso, es posible que el usuario pueda ver los eventos de otro usuario o la información de configuración para la pantalla que esté mostrando en ese momento.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-03-05 CVE Reserved
  • 2018-03-07 CVE Published
  • 2023-07-08 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (1)
URL Date SRC
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Microfocus
Search vendor "Microfocus"
Sentinel
Search vendor "Microfocus" for product "Sentinel"
<= 8.1
Search vendor "Microfocus" for product "Sentinel" and version " <= 8.1"
-
Affected