Unrated severityNVD Advisory· Published Aug 23, 2012· Updated Apr 29, 2026
CVE-2012-4605
CVE-2012-4605
Description
The default configuration of the SMTP component in Websense Email Security 6.1 through 7.3 enables weak SSL ciphers in the "SurfControl plc\SuperScout Email Filter\SMTP" registry key, which makes it easier for remote attackers to obtain sensitive information by sniffing the network and then conducting a brute-force attack against encrypted session data.
Affected products
5cpe:2.3:a:websense:websense_email_security:6.1:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:websense:websense_email_security:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:websense:websense_email_security:6.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:websense:websense_email_security:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:websense:websense_email_security:7.1:*:*:*:*:*:*:*
- cpe:2.3:a:websense:websense_email_security:7.2:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.