This article is more than 4 years old

Sheesh.

Check out this newly published knowledgebase article from McAfee Intel Security:

A specially crafted username can bypass SIEM ESM authentication (password is not validated) if the ESM is configured to use Active Directory or LDAP authentication sources. This can result in the attacker gaining NGCP (master user) access to the ESM. Sign up to our newsletter

Security news, advice, and tips. This update resolves an issue where the login username is mishandled. CVE-2015-8024 McAfee Enterprise Security Manager (ESM), Enterprise Security Manager/Log Manager (ESMLM), and Enterprise Security Manager/Receiver (ESMREC) 9.3.x before 9.3.2MR19, 9.4.x before 9.4.2MR9, and 9.5.x before 9.5.0MR8, when configured to use Active Directory or LDAP authentication sources, allow remote attackers to bypass authentication by logging in with the username “NGCP|NGCP|NGCP;” and any password. https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8024

I’m speechless.

In fact, I don’t think I believe my eyes. So, let’s let that sink in…

You can login remotely as an administrator to McAfee Enterprise Security Manager using the username “NGCP|NGCP|NGCP;” and it doesn’t care what password you enter.

Nope, still finding it hard to believe.

It beggars belief doesn’t it? In case you had forgotten, McAfee was a security company.

If your company is going to continue using McAfee Enterprise Security Manager please ensure that the patches are installed. Pronto.

Hat-tip: The Register.

Found this article interesting? Follow Graham Cluley on Twitter to read more of the exclusive content we post.