FireEye Operating System Multiple Vulnerabilities

This script is Copyright (C) 2016 Tenable Network Security, Inc.

Synopsis :

The remote host is missing a vendor-supplied security patch.

Description :

The remote host is running a version of FireEye Operating System
(FEOS) that is missing a vendor-supplied security patch. It is,
therefore, affected by multiple vulnerabilities :

- An flaw exists in the Virtual Execution Engine (VXE)
during the handling of file names that were previously
flagged for the whitelist. A remote attacker can exploit
this, via subsequent malicious files with the same file
name, to bypass the analysis engine. (VulnDB 134606)

- A flaw exists when handling a specially crafted URL that
allows an authenticated, remote attacker to render
plaintext in the web user interface post-authentication,
resulting in the disclosure of sensitive information.
(VulnDB 134607)

NOTE: FX version 7.5.0 is affected by the Analysis Engine Evasion
vulnerability, but NOT the URL Encoded Bypass vulnerability.

See also :

Solution :

Apply the relevant patch referenced in the vendor advisory.

Risk factor :

Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.6
Public Exploit Available : true

Family: Firewalls

Nessus Plugin ID: 89724 ()

Bugtraq ID:


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now