Command Injection Vulnerability in WatchGuard XCS Email Security Solution
CVE-2011-2165

Currently unrated

Key Information:

Vendor
Watchguard
Status
Vendor
CVE Published:
23 May 2011

Summary

The STARTTLS implementation in WatchGuard XCS versions 9.0 and 9.1 is susceptible to a plaintext command injection attack. This vulnerability allows man-in-the-middle attackers to execute arbitrary commands by injecting cleartext commands into an encrypted SMTP session. The flaw arises from improper handling of I/O buffering during the STARTTLS process, enabling malicious actors to exploit this weakness after the TLS connection is established. This issue closely resembles similar vulnerabilities in other systems, emphasizing the importance of robust security practices to mitigate such risks.

References

EPSS Score

9% chance of being exploited in the next 30 days.

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.