Firebox Unauthenticated Remote Code Execution Vulnerability
Advisory ID
WGSA-2022-00002
CVE
CVE-2022-26318
Impact
Critical
Status
Resolved
Product Family
Firebox
Published Date
Updated Date
Workaround Available
False
CVSS Score
9.8
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Null pointer dereference in WatchGuard Firebox and XTM appliances allows an unauthenticated remote attacker to potentially execute arbitrary code via exposed management access.
WatchGuard has evidence that adversaries are actively exploiting this vulnerability in the wild and urges all Firebox device administrators to update to the protected firmware release as quickly as possible. Additionally, Firebox device administrators should follow recommended best practices and restrict management access to trusted networks only.
Affected
Fireware OS before 12.7.2_U2, 12.x before 12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2.
Resolution
Fireware OS 12.8, 12.7.2_U2, 12.5.9_U2, 12.1.3_U8
Credits
Internally discovered
Advisory Product List
Product Family | Product Branch | Product List |
---|---|---|
Firebox
|
Fireware OS 12.x | T20, T25, T40, T45, T55, T70, T80, T85, M270, M290, M370, M390, M470, M570, M590, M670, M690, M440, M4600, M4800, M5600, M5800, Firebox Cloud, Firebox NV5, FireboxV |
Firebox
|
Fireware OS 12.5.x | T15, T35 |