Command Injection Vulnerability in WatchGuard XCS Email Security Solution
CVE-2011-2165
Currently unrated
Summary
The STARTTLS implementation in WatchGuard XCS versions 9.0 and 9.1 is susceptible to a plaintext command injection attack. This vulnerability allows man-in-the-middle attackers to execute arbitrary commands by injecting cleartext commands into an encrypted SMTP session. The flaw arises from improper handling of I/O buffering during the STARTTLS process, enabling malicious actors to exploit this weakness after the TLS connection is established. This issue closely resembles similar vulnerabilities in other systems, emphasizing the importance of robust security practices to mitigate such risks.
References
EPSS Score
9% chance of being exploited in the next 30 days.
Timeline
Vulnerability published
Vulnerability Reserved