Vulnerabilities In WebSense – Hotfix Available

Looks like the folks at NGS Secure have been poking around the WebSense Triton products, and have uncovered at least 3 vulnerabilities.

WebSense has a hotfix available (HotFix24), but it is only available to those who have an account on their website.  If you have WebSense Triton 7.6 or earlier, you should be looking at downloading and applying this hotfix.

1) Critical Vulnerability in Websense Triton

  •  Impact: Unauthenticated remote command execution as SYSTEM
  •  Versions affected include:  Websense Web Security Gateway Anywhere v7.6 Websense Web Security Gateway v7.6 Websense Web Security v7.6 Websense Web Filter v7.6 Windows and Linux

2) High Risk Vulnerability in Websense Triton

  • Impact: Authentication bypass
  • Versions affected include: Websense Web Security Gateway Anywhere v7.6 Websense Web Security Gateway v7.6 Websense Web Security v7.6 Websense Web Filter v7.6 Windows and Linux

3) Medium Risk Vulnerability in Websense Triton

  • Impact: Reflected XSS
  • Versions affected include:  Websense Web Security Gateway Anywhere v7.6 Websense Web Security Gateway v7.6 Websense Web Security v7.6 Websense Web Filter v7.6 Windows and Linux

NGS Secure is going to withhold details of this flaw for three months. This three month window will allow users the time needed to apply the patch before the details are released to the general public. This reflects the NGS Secure approach to responsible disclosure.

These issue are addressed in Hotfix 24, which can be downloaded at:

https://www.websense.com/content/mywebsense-hotfixes.aspx

Advertisements