Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2022-23
Version:
1.0
Affected software:
For CVE-2022-26318, CVE-2022-31789 and CVE-2022-31790: Watchguard Fireware OS before 12.8.1, 12.x before 12.1.4, and 12.2.x through 12.5.x before 12.5.10
For CVE-2022-31791: Fireware OS before 12.7.2_U2, 12.x before 12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2
Type:
Remote Code Execution (RCE), Privilege Escalation and Information Disclosure vulnerabilities
CVE/CVSS:
CVE-2022-26318 (WGSA-2022-00002) - CVSS: 9.8CVE-2022-31789 (WGSA-2022-00015) - CVSS: 9.8CVE-2022-31790 (WGSA-2022-00017) - CVSS: 7.5CVE-2022-31791 (WGSA-2022-00018) - CVSS: 4.4
https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00002
https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00015
https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00017
https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00018
Watchguard released a security update addressing four vulnerabilities affecting Firebox/XTM appliances, one of which is actively being exploited in the wild (CVE-2022-31789) and another that is a zero-day (CVE-2022-31791).
CVE-2022-26318 allows an unauthenticated remote attacker to potentially execute arbitrary code via exposed management access.
CVE-2022-31789 allows an unauthenticated remote attacker to trigger a buffer overflow and potentially execute arbitrary code by sending a malicious request to exposed management ports.
CVE-2022-31790 allows an unauthenticated remote attacker to retrieve sensitive authentication server settings by sending a malicious request to exposed authentication endpoints.
CVE-2022-31791 allows an attacker to execute commands in order to escalate their privileges to root user.
The Centre for Cyber Security Belgium recommends administrators to check if they have vulnerable versions of Watchguard Firebox/XTM devices. If that is the case, the CCB strongly recommends applying the available patches as soon as possible.
The Centre for Cyber Security Belgium also advises to not expose unrestricted management access to the internet.