ITM Server Communications Hijack (CVE-2023-4828)
Advisory ID: PFPT-SA-2023-0008
An improper check for an exceptional condition in the Insider Threat Management (ITM) Server could be used by an attacker to change the server's configuration of any already-registered agent so that the agent sends all future communications to an attacker-chosen URL. This could result in disclosure of sensitive data events from the agent about the personally identifiable information (PII) and intellectual property it monitors, and all such data could be altered or deleted before reaching the ITM Server. An attacker must first successfully obtain valid agent credentials and agent hostname. All versions prior to 7.14.3.69 are affected.
Vulnerability Information
This vulnerability is identified by CVE-2023-4828.
The vulnerability has been assigned a CVSS score of 6.4 (Medium):
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L
Fixed Software
Proofpoint has released fixed software versions 7.14.3.69 and 7.15.0.
Proofpoint Customers can view further details in the Proofpoint Community (login required).
URL
https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-008
Revision History
Version | Description | Section | Date |
1.1 | Update potential impact and CVSS score | Summary and Vulnerability Information | Oct 13, 2023 |
1.0 | Initial release | Sep 13, 2023 |
Legal Disclaimer
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. PROOFPOINT RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for authorized subscribers to Proofpoint products and services.