WatchGuard Fireware v11.12.1 and earlier mishandles requests referring to an XML External Entity (XXE), in the XML-RPC agent. This causes the Firebox wgagent process to crash. This process crash ends all authenticated sessions to the Firebox, including management connections, and prevents new authenticated sessions until the process has recovered. The Firebox may also experience an overall degradation in performance while the wgagent process recovers. An attacker could continuously send XML-RPC requests that contain references to external entities to perform a limited Denial of Service (DoS) attack against an affected Firebox.
References
Link | Resource |
---|---|
https://www.watchguard.com/support/release-notes/fireware/11/en-US/EN_ReleaseNotes_Fireware_11_12_2/index.html | Release Notes Vendor Advisory |
https://www.sidertia.com/Home/Community/Blog/2017/04/17/Fixed-the-Fireware-Vulnerabilities-discovered-by-Sidertia | Exploit Third Party Advisory |
https://packetstormsecurity.com/files/142177/watchguardfbxtm-xxeinject.txt | Exploit Third Party Advisory VDB Entry |
http://watchguardsupport.force.com/publicKB?type=KBSecurityIssues&SFDCID=kA62A0000000KlBSAU | Vendor Advisory |
Configurations
Information
Published : 2017-04-22 15:59
Updated : 2017-04-27 12:45
NVD link : CVE-2017-8056
Mitre link : CVE-2017-8056
JSON object : View
CWE
CWE-611
Improper Restriction of XML External Entity Reference
Products Affected
watchguard
- fireware