McAfee's enterprise security software can be bypassed with a 'specially crafted username'

Security breach lock

A kind word will open any door, but a special kind word will open all doors to an otherwise safe computer system, a McAfee advisory says.

The advisory has said that "a specially crafted username" can get past the Security Information & Event Management logins without authentication, and without a password, "if the ESM is configured to use Active Directory or LDAP".

What does that mean, exactly? It means a potential attacker can get access to NGCP (the default username created at first installation).

"A specially crafted username can bypass SIEM ESM authentication (password is not validated) if the ESM is configured to use Active Directory or LDAP authentication sources. This can result in the attacker gaining NGCP (master user) access to the ESM", the advisory says.

Designated CVE-2015-8024, the bug covers "McAfee Enterprise Security Manager (ESM), Enterprise Security Manager/Log Manager (ESMLM), and Enterprise Security Manager/Receiver (ESMREC) 9.3.x before 9.3.2MR19, 9.4.x before 9.4.2MR9, and 9.5.x before 9.5.0MR8, when configured to use Active Directory or LDAP authentication sources, allow remote attackers to bypass authentication by logging in with the username 'NGCP|NGCP|NGCP;' and any password", the advisory states.

There are, however, ways to protect yourselves. The best solution would be to update the software immediately, but in case you’re not able to do so -- don’t worry. For now, disabling all Active Directory and LDAP authentication sources in the Enterprise Security Manager will suffice.

The update link for the software is in the advisory.

Published under license from ITProPortal.com, a Net Communities Ltd Publication. All rights reserved.

Image Credit: Sergey Nivens / Shutterstock

7 Responses to McAfee's enterprise security software can be bypassed with a 'specially crafted username'

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.