WatchGuard Fireware v11.12.1 and earlier mishandles requests referring to an XML External Entity (XXE), in the XML-RPC agent. This causes the Firebox wgagent process to crash. This process crash ends all authenticated sessions to the Firebox, including management connections, and prevents new authenticated sessions until the process has recovered. The Firebox may also experience an overall degradation in performance while the wgagent process recovers. An attacker could continuously send XML-RPC requests that contain references to external entities to perform a limited Denial of Service (DoS) attack against an affected Firebox.
References
Configurations
History
21 Nov 2024, 03:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://watchguardsupport.force.com/publicKB?type=KBSecurityIssues&SFDCID=kA62A0000000KlBSAU - Vendor Advisory | |
References | () https://packetstormsecurity.com/files/142177/watchguardfbxtm-xxeinject.txt - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.sidertia.com/Home/Community/Blog/2017/04/17/Fixed-the-Fireware-Vulnerabilities-discovered-by-Sidertia - Exploit, Third Party Advisory | |
References | () https://www.watchguard.com/support/release-notes/fireware/11/en-US/EN_ReleaseNotes_Fireware_11_12_2/index.html - Release Notes, Vendor Advisory |
Information
Published : 2017-04-22 22:59
Updated : 2024-11-21 03:33
NVD link : CVE-2017-8056
Mitre link : CVE-2017-8056
CVE.ORG link : CVE-2017-8056
JSON object : View
Products Affected
watchguard
- fireware
CWE
CWE-611
Improper Restriction of XML External Entity Reference