The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Forcepoint TRITON AP-EMAIL: file reading

Synthesis of the vulnerability 

A local attacker can read a file of Forcepoint TRITON AP-EMAIL, in order to obtain sensitive information.
Impacted software: TRITON AP-EMAIL.
Severity of this computer vulnerability: 2/4.
Creation date: 07/11/2017.
Références of this announce: 000014490, CVE-2017-11177, VIGILANCE-VUL-24358.

Description of the vulnerability 

A local attacker can read a file of Forcepoint TRITON AP-EMAIL, in order to obtain sensitive information.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This security announce impacts software or systems such as TRITON AP-EMAIL.

Our Vigil@nce team determined that the severity of this threat is medium.

The trust level is of type confirmed by the editor, with an origin of intranet client.

An attacker with a expert ability can exploit this computer vulnerability announce.

Solutions for this threat 

Forcepoint TRITON AP-EMAIL: version 8.2 IB.
The version 8.2 IB is fixed.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides system vulnerability bulletins. The technology watch team tracks security threats targeting the computer system.