National Cyber Awareness System: 07/12/2013 02:19 PM EDT
Original release date: July 12, 2013
Systems AffectedMcAfee ePolicy Orchestrator (ePO) OverviewA new exploit tool targets two vulnerabilities in McAfee’s ePolicy Orchestrator (ePO). DescriptionA new exploit tool specifically built to attack McAfee’s ePolicy Orchestrator (ePO) targets two vulnerabilities found in ePO versions 4.6.5 and earlier. In order to exploit these vulnerabilities the attacker must be on the local network. ImpactThe tool allows an attacker on the local network to add rogue systems to an enterprise ePO server, steal domain credentials if they are cached within ePO, upload files to the ePO server, and execute commands on the ePO server as well as any systems managed by ePO. SolutionIdentify Vulnerable ePO Versions To determine whether your instance of ePO is vulnerable, please refer to KB52634 and KB59938:
ePolicy Orchestrator 4.5.6 (Build: 137) - Microsoft Internet Explorer
ePolicy Orchestrator 4.6.5 (Build: 168) - Microsoft Internet Explorer Update ePO This tool poses a significant risk to enterprises that use ePO and the following mitigation steps are strongly advised.
Restrict Access to ePO Additionally, US-CERT recommends that administrators use dedicated remote administration consoles and set strict access controls that only allow specified systems to connect to the ePO server, reducing the potential attack surface. References
Revision History
This product is provided subject to this Notification and this Privacy & Use policy. |