CVE-2012-3579
Symantec Messaging Gateway < 9.5.4 - Access Control
Title source: ruleDescription
Symantec Messaging Gateway (SMG) before 10.0 has a default password for an unspecified account, which makes it easier for remote attackers to obtain privileged access via an SSH session.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/21136
metasploit
WORKING POC
EXCELLENT
by Stefan Viehbock, Ben Williams, sinn3r · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/symantec_smg_ssh.rb
References (4)
Scores
EPSS
0.3637
EPSS Percentile
97.1%
Details
CWE
CWE-264
Status
published
Products (5)
symantec/messaging_gateway
9.5
symantec/messaging_gateway
9.5.1
symantec/messaging_gateway
9.5.2
symantec/messaging_gateway
9.5.3
symantec/messaging_gateway
< 9.5.4
Published
Aug 29, 2012
Tracked Since
Feb 18, 2026