Proofpoint Threat Response / Threat Response Auto-Pull (PTR/TRAP) Information Disclosure

Proofpoint Threat Response / Threat Response Auto-Pull (PTR/TRAP) Information Disclosure, CVE-2023-2820

An information disclosure vulnerability in the faye endpoint in Proofpoint Threat Response / Threat Response Auto-Pull (PTR/TRAP) could be used by an attacker on an adjacent network to obtain credentials to integrated services via a man-in-the-middle position or cryptanalysis of the session traffic. An attacker could use these credentials to impersonate PTR/TRAP to these services. All versions prior to 5.10.0 are affected. 

Vulnerability Information 

This vulnerability is identified by CVE-2023-2820. Proofpoint has released patches to address this issue. If you are running a known vulnerable release, please update to a fully supported version as soon as possible. 

This vulnerability has been assigned a CVSS score of 6.1 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N). 

Fixed Software 

Proofpoint has released fixed software version 5.10.0. 

The fixed software versions are available through the customer support portal. 

URL 

https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-0003 

Revision History 

Version 

Description 

Section 

Date 

1.0 

Initial release 

Advisory 

June 14, 2023 

Legal Disclaimer 

THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. PROOFPOINT RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. 

A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for authorized subscribers to Proofpoint products and services.