WatchGuard Fireware v11.12.1 and earlier mishandles requests referring to an XML External Entity (XXE), in the XML-RPC agent. This causes the Firebox wgagent process to crash. This process crash ends all authenticated sessions to the Firebox, including management connections, and prevents new authenticated sessions until the process has recovered. The Firebox may also experience an overall degradation in performance while the wgagent process recovers. An attacker could continuously send XML-RPC requests that contain references to external entities to perform a limited Denial of Service (DoS) attack against an affected Firebox.
References
Link | Resource |
---|---|
http://watchguardsupport.force.com/publicKB?type=KBSecurityIssues&SFDCID=kA62A0000000KlBSAU | Vendor Advisory |
https://packetstormsecurity.com/files/142177/watchguardfbxtm-xxeinject.txt | Exploit Third Party Advisory VDB Entry |
https://www.sidertia.com/Home/Community/Blog/2017/04/17/Fixed-the-Fireware-Vulnerabilities-discovered-by-Sidertia | Exploit Third Party Advisory |
https://www.watchguard.com/support/release-notes/fireware/11/en-US/EN_ReleaseNotes_Fireware_11_12_2/index.html | Release Notes Vendor Advisory |
Configurations
History
No history.
Information
Published : 2017-04-22 22:59
Updated : 2024-02-04 19:11
NVD link : CVE-2017-8056
Mitre link : CVE-2017-8056
CVE.ORG link : CVE-2017-8056
JSON object : View
Products Affected
watchguard
- fireware
CWE
CWE-611
Improper Restriction of XML External Entity Reference