Unattended Workstation Post-Logoff Session-Reuse Vulnerability in IBM Sterling Secure Proxy

Unattended Workstation Post-Logoff Session-Reuse Vulnerability in IBM Sterling Secure Proxy

CVE-2016-6025 · MEDIUM Severity

AV:L/AC:L/AU:N/C:P/I:P/A:P

The Configuration Manager in IBM Sterling Secure Proxy (SSP) 3.4.2 before 3.4.2.0 iFix 8 and 3.4.3 before 3.4.3.0 iFix 1 allows remote attackers to obtain access by leveraging an unattended workstation to conduct a post-logoff session-reuse attack involving a modified URL.

Learn more about our Cis Benchmark Audit For Ibm I.