Intel McAfee ePolicy Orchestrator (ePO) 4.x up to and including 4.6.9 and 5.x up to and including 5.1.2 does not validate server names and Certification Authority names in X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mcafee epolicy orchestrator 4.5.6 |
||
mcafee epolicy orchestrator 4.5.7 |
||
mcafee epolicy orchestrator 4.6.6 |
||
mcafee epolicy orchestrator 4.6.7 |
||
mcafee epolicy orchestrator 5.1.2 |
||
mcafee epolicy orchestrator 4.0 |
||
mcafee epolicy orchestrator 4.5.0 |
||
mcafee epolicy orchestrator 4.6.2 |
||
mcafee epolicy orchestrator 4.6.3 |
||
mcafee epolicy orchestrator 5.0.0 |
||
mcafee epolicy orchestrator 5.0.1 |
||
mcafee epolicy orchestrator 4.5.3 |
||
mcafee epolicy orchestrator 4.5.4 |
||
mcafee epolicy orchestrator 4.5.5 |
||
mcafee epolicy orchestrator 4.6.4 |
||
mcafee epolicy orchestrator 4.6.5 |
||
mcafee epolicy orchestrator 5.1.0 |
||
mcafee epolicy orchestrator 5.1.1 |
||
mcafee epolicy orchestrator 4.6.0 |
||
mcafee epolicy orchestrator 4.6.1 |
||
mcafee epolicy orchestrator 4.6.8 |
||
mcafee epolicy orchestrator 4.6.9 |