The Secondary server in Threat Intelligence Exchange (TIE) prior to 1.2.0 uses weak permissions for unspecified (1) configuration files and (2) installation logs, which allows local users to obtain sensitive information by reading the files.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mcafee threat intelligence exchange |