CVE-2012-3579

Symantec Messaging Gateway < 9.5.4 - Access Control

Title source: rule

Description

Symantec Messaging Gateway (SMG) before 10.0 has a default password for an unspecified account, which makes it easier for remote attackers to obtain privileged access via an SSH session.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/21136
metasploit WORKING POC EXCELLENT
by Stefan Viehbock, Ben Williams, sinn3r · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/symantec_smg_ssh.rb

Scores

EPSS 0.3637
EPSS Percentile 97.1%

Details

CWE
CWE-264
Status published
Products (5)
symantec/messaging_gateway 9.5
symantec/messaging_gateway 9.5.1
symantec/messaging_gateway 9.5.2
symantec/messaging_gateway 9.5.3
symantec/messaging_gateway < 9.5.4
Published Aug 29, 2012
Tracked Since Feb 18, 2026