Vulnerabilities > CVE-2017-8056 - XXE vulnerability in Watchguard Fireware 11.0.2/11.1/11.2.1
Summary
WatchGuard Fireware v11.12.1 and earlier mishandles requests referring to an XML External Entity (XXE), in the XML-RPC agent. This causes the Firebox wgagent process to crash. This process crash ends all authenticated sessions to the Firebox, including management connections, and prevents new authenticated sessions until the process has recovered. The Firebox may also experience an overall degradation in performance while the wgagent process recovers. An attacker could continuously send XML-RPC requests that contain references to external entities to perform a limited Denial of Service (DoS) attack against an affected Firebox.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 3 |
Common Weakness Enumeration (CWE)
Packetstorm
data source | https://packetstormsecurity.com/files/download/144242/wgfx-dos.txt |
id | PACKETSTORM:144242 |
last seen | 2017-09-19 |
published | 2017-09-19 |
reporter | David Fernandez |
source | https://packetstormsecurity.com/files/144242/Watchguard-Firebox-XTM-XML-RPC-Empty-Member-Denial-Of-Service.html |
title | Watchguard Firebox / XTM XML-RPC Empty Member Denial Of Service |
References
- http://watchguardsupport.force.com/publicKB?type=KBSecurityIssues&SFDCID=kA62A0000000KlBSAU
- http://watchguardsupport.force.com/publicKB?type=KBSecurityIssues&SFDCID=kA62A0000000KlBSAU
- https://packetstormsecurity.com/files/142177/watchguardfbxtm-xxeinject.txt
- https://packetstormsecurity.com/files/142177/watchguardfbxtm-xxeinject.txt
- https://www.sidertia.com/Home/Community/Blog/2017/04/17/Fixed-the-Fireware-Vulnerabilities-discovered-by-Sidertia
- https://www.sidertia.com/Home/Community/Blog/2017/04/17/Fixed-the-Fireware-Vulnerabilities-discovered-by-Sidertia
- https://www.watchguard.com/support/release-notes/fireware/11/en-US/EN_ReleaseNotes_Fireware_11_12_2/index.html
- https://www.watchguard.com/support/release-notes/fireware/11/en-US/EN_ReleaseNotes_Fireware_11_12_2/index.html