I manage multiple location from my ePO, each region has own Agent handler and some of them have additional SuperAgent in order to load balancing.
I've putted my attention on ServerSiteList.xml file generated during agent installation because all information about infrastructure are stored in this particular file are in plain text.
Isn't it a little bit sensitive if we keep FQDN which pointing to particular customer in plain text?
Having this file attacker don't need to do any reconnaissance and can prepare target attack on AV infrustructure.
From my point of view information about infrastructure should be stored on encrypted XML or Agent DB not in plain text in location where anybody can read file.
Or maybe it's already possibile to encrypted this file but I just omimited option in ePO ?
Solved! Go to Solution.
As suggested, please open a ticket as a vulnerability request.
Was my reply helpful?
If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?
Where exactly are you seeing that sitelist file and what version of the agent are you running? That should be in the ma.db files.
Was my reply helpful?
If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?
Trellix Agent 5.7.9 installation brings ServerSiteList.xml to /opt/McAfee/agent/data directory
If a hacker can get to the file on the local system, it is already compromised. You can open an SR if you want for investigation.
Was my reply helpful?
If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?
System has not been compromised yet I'm concerned about keeping information of infrastructure in plain text. That putting some risk on customer environment.
I would not willing to show everybody how AV infrastructure is configured, however keeping this information in plain text putting risk on customer in situation in case of endpoint will be stolen for exampel.
Having knowledge about customer's machines in DMZ and vulenrabilities related to McAfee/Trellix software (including apache and tomcat), the preparation of potential attack on agent handlers in DMZ would be pretty easy, that would led to disabling communication between ePO and endpoints connected to ePO over internet and that would make blind the whole security on customer side.
As suggested, please open a ticket as a vulnerability request.
Was my reply helpful?
If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?
New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.
Thousands of customers use our Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership: