ITM Server Communications Hijack (CVE-2023-4828)
Advisory ID: PFPT-SA-2023-0008
An improper check for an exceptional condition in the Insider Threat Management (ITM) Server could be used by an attacker to change the configuration of any already-registered agent so that all future agent communications are sent to an attacker-chosen URL. An attacker must first successfully obtain valid agent credentials and target agent hostname. All versions prior to 188.8.131.52 are affected.
This vulnerability is identified by CVE-2023-4828.
The vulnerability has been assigned a CVSS score of 8.8 (High):
Proofpoint has released fixed software versions 184.108.40.206 and 7.15.0.
Proofpoint Customers can view further details in the Proofpoint Community (login required).
|1.0||Initial release||Sept 13, 2023|
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. PROOFPOINT RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for authorized subscribers to Proofpoint products and services.