Trend Micro ScanMail for Exchange 10.2 < Build 3318 / 11.x < Build 4180 Predictable Session IDs

Medium Nessus Plugin ID 84007


The remote Windows host has an email security application installed with weak session ID generation.


The version of Trend Micro ScanMail for Exchange (SMEX) installed on the remote Windows host is affected by a flaw in its bundled web-based user interface due to insufficient complexity in the generation of session IDs. A remote attacker, by more easily guessing the session ID, can use an authenticated user's session to gain access to the web interface.


Apply 11.0 Hot Fix Build 4180 / 10.2 Hot Fix Build 3318.

See Also

Plugin Details

Severity: Medium

ID: 84007

File Name: trendmicro_smex_11_0_4180.nasl

Version: $Revision: 1.4 $

Type: local

Agent: windows

Family: Windows

Published: 2015/06/05

Modified: 2017/06/12

Dependencies: 84008

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:trend_micro:scanmail

Required KB Items: installed_sw/Trend Micro ScanMail for Exchange

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/04/20

Vulnerability Publication Date: 2015/04/20

Reference Information

CVE: CVE-2015-3326

BID: 74661

OSVDB: 122185