Remote Command Execution Vulnerability in WatchGuard XCS
CVE-2015-5453
Key Information:
- Vendor
- Watchguard
- Status
- Vendor
- CVE Published:
- 8 July 2015
Badges
Summary
WatchGuard XCS versions 9.2 and 10.0 prior to build 150522 are susceptible to a remote command execution vulnerability. This issue allows authenticated remote users to execute arbitrary commands on the system by injecting shell metacharacters into the 'id' parameter accessed via ADMIN/mailqueue.spl. This breach can lead to unauthorized access, posing significant risks to the integrity and confidentiality of the affected systems. Administrators are strongly advised to apply the available security updates to mitigate this risk.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
69% chance of being exploited in the next 30 days.
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved