This script is Copyright (C) 2016 Tenable Network Security, Inc.
The remote host is missing a vendor-supplied security patch.
The remote host is running a version of FireEye Operating System
(FEOS) that is missing a vendor-supplied security patch. It is,
therefore, affected by multiple vulnerabilities :
- An flaw exists in the Virtual Execution Engine (VXE)
during the handling of file names that were previously
flagged for the whitelist. A remote attacker can exploit
this, via subsequent malicious files with the same file
name, to bypass the analysis engine. (VulnDB 134606)
- A flaw exists when handling a specially crafted URL that
allows an authenticated, remote attacker to render
plaintext in the web user interface post-authentication,
resulting in the disclosure of sensitive information.
NOTE: FX version 7.5.0 is affected by the Analysis Engine Evasion
vulnerability, but NOT the URL Encoded Bypass vulnerability.
See also :
Apply the relevant patch referenced in the vendor advisory.
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.6
Public Exploit Available : true
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now