Blue Coat ProxyClient < 3.3.3.3 / 3.4.x < 3.4.4.10 Certificate Validation MitM

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

An application installed on the remote host is affected by a
man-in-the-middle vulnerability.

Description :

The version of Blue Coat ProxyClient installed on the remote Windows
host is either prior to 3.3.3.3 or is 3.4.x prior to 3.4.4.10. It is,
therefore, affected by a man-in-the-middle (MitM) vulnerability due to
improper validation of the Client Manager certificate. A MitM attacker
can exploit this, via a specially crafted certificate, to spoof
ProxySG Client Managers, allowing the attacker to modify
configurations and execute arbitrary software updates.

See also :

https://bto.bluecoat.com/security-advisory/sa89

Solution :

Upgrade to Blue Coat ProxyClient version 3.3.3.3 / 3.4.4.10 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: MacOS X Local Security Checks

Nessus Plugin ID: 93404 ()

Bugtraq ID: 73150

CVE ID: CVE-2015-1454

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now