Proofpoint Threat Response / Threat Response Auto-Pull (PTR/TRAP) Information Disclosure, CVE-2023-2820
An information disclosure vulnerability in the faye endpoint in Proofpoint Threat Response / Threat Response Auto-Pull (PTR/TRAP) could be used by an attacker on an adjacent network to obtain credentials to integrated services via a man-in-the-middle position or cryptanalysis of the session traffic. An attacker could use these credentials to impersonate PTR/TRAP to these services. All versions prior to 5.10.0 are affected.
Vulnerability Information
This vulnerability is identified by CVE-2023-2820. Proofpoint has released patches to address this issue. If you are running a known vulnerable release, please update to a fully supported version as soon as possible.
This vulnerability has been assigned a CVSS score of 6.1 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Fixed Software
Proofpoint has released fixed software version 5.10.0.
The fixed software versions are available through the customer support portal.
URL
https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-0003
Revision History
Version |
Description |
Section |
Date |
1.0 |
Initial release |
Advisory |
June 14, 2023 |
Legal Disclaimer
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. PROOFPOINT RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for authorized subscribers to Proofpoint products and services.