Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <7378c405-5150-ebea-b81d-74f32cff7516@lexfo.fr>
Date: Tue, 30 Aug 2022 16:25:12 +0200
From: Charles Fol <c.fol@...fo.fr>
To: oss-security@...ts.openwall.com
Subject: CVE-2022-31790 CVE-2022-31789: Watchguard XTM/Firebox firewalls:
 Multiple vulnerabilities

Hello,

While performing a red-team assessment we discovered a few 
vulnerabilities on Watchguard firewalls of the XTM/Firebox brand:

Here are the different CVEs and WSGA references for the bugs:

- Xpath time-based injection in wgcgi: CVE-2022-31790, WSGA-2022-00017
- Integer overflow leading to UAF/overflow in wgagent: CVE-2022-31789, 
WSGA-2022-00015
- Local privilege escalation from nobody to root: WSGA-2022-00018

Combined, the two latter bugs lead to pre-authentication remote code 
execution as root on XTM/Firebox devices.
Although the second bug is present in both XTM and Firebox models, the 
exploitation differs as the libc (ptmalloc) version is different, 
(respectively 2.19 and 2.28).

A very in-depth blog-post is available here:
https://www.ambionics.io/blog/hacking-watchguard-firewalls

References:

https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00015
https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00017
https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00018

Regards,
Charles

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.