Lucene search

K
cve[email protected]CVE-2021-30648
HistoryJun 30, 2021 - 11:15 a.m.

CVE-2021-30648

2021-06-3011:15:08
CWE-287
web.nvd.nist.gov
24
symantec
asg
proxysg
web management
authentication bypass
cli commands
configuration
policy
shutdown
restart
vulnerability
nvd
cve-2021-30648

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:P/I:P/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

71.3%

The Symantec Advanced Secure Gateway (ASG) and ProxySG web management consoles are susceptible to an authentication bypass vulnerability. An unauthenticated attacker can execute arbitrary CLI commands, view/modify the appliance configuration and policy, and shutdown/restart the appliance.

Affected configurations

NVD
Node
broadcomsymantec_proxysgRange6.56.5.10.16
OR
broadcomsymantec_proxysgRange6.66.6.5.19
OR
broadcomsymantec_proxysgRange6.76.7.5.12
OR
broadcomsymantec_proxysgRange7.27.2.7.2
OR
broadcomsymantec_proxysgRange7.37.3.3.3
Node
broadcomsymantec_advanced_secure_gateway_s200-30Match-
AND
broadcomsymantec_advanced_secure_gateway_s200-30_firmwareRange6.66.7.4.17
OR
broadcomsymantec_advanced_secure_gateway_s200-30_firmwareRange6.7.5.06.7.5.12
OR
broadcomsymantec_advanced_secure_gateway_s200-30_firmwareRange7.27.2.7.2
OR
broadcomsymantec_advanced_secure_gateway_s200-30_firmwareRange7.37.3.3.3
Node
broadcomsymantec_advanced_secure_gateway_s200-40Match-
AND
broadcomsymantec_advanced_secure_gateway_s200-40_firmwareRange6.66.7.4.17
OR
broadcomsymantec_advanced_secure_gateway_s200-40_firmwareRange6.7.5.06.7.5.12
OR
broadcomsymantec_advanced_secure_gateway_s200-40_firmwareRange7.27.2.7.2
OR
broadcomsymantec_advanced_secure_gateway_s200-40_firmwareRange7.37.3.3.3
Node
broadcomsymantec_advanced_secure_gateway_s400-20Match-
AND
broadcomsymantec_advanced_secure_gateway_s400-20_firmwareRange6.66.7.4.17
OR
broadcomsymantec_advanced_secure_gateway_s400-20_firmwareRange6.7.5.06.7.5.12
OR
broadcomsymantec_advanced_secure_gateway_s400-20_firmwareRange7.27.2.7.2
OR
broadcomsymantec_advanced_secure_gateway_s400-20_firmwareRange7.37.3.3.3
Node
broadcomsymantec_advanced_secure_gateway_s400-30Match-
AND
broadcomsymantec_advanced_secure_gateway_s400-30_firmwareRange6.66.7.4.17
OR
broadcomsymantec_advanced_secure_gateway_s400-30_firmwareRange6.7.5.06.7.5.12
OR
broadcomsymantec_advanced_secure_gateway_s400-30_firmwareRange7.27.2.7.2
OR
broadcomsymantec_advanced_secure_gateway_s400-30_firmwareRange7.37.3.3.3
Node
broadcomsymantec_advanced_secure_gateway_s400-40Match-
AND
broadcomsymantec_advanced_secure_gateway_s400-40_firmwareRange6.66.7.4.17
OR
broadcomsymantec_advanced_secure_gateway_s400-40_firmwareRange6.7.5.06.7.5.12
OR
broadcomsymantec_advanced_secure_gateway_s400-40_firmwareRange7.27.2.7.2
OR
broadcomsymantec_advanced_secure_gateway_s400-40_firmwareRange7.37.3.3.3
Node
broadcomsymantec_advanced_secure_gateway_500-10Match-
AND
broadcomsymantec_advanced_secure_gateway_500-10_firmwareRange6.66.7.4.17
OR
broadcomsymantec_advanced_secure_gateway_500-10_firmwareRange6.7.5.06.7.5.12
OR
broadcomsymantec_advanced_secure_gateway_500-10_firmwareRange7.27.2.7.2
OR
broadcomsymantec_advanced_secure_gateway_500-10_firmwareRange7.37.3.3.3
Node
broadcomsymantec_advanced_secure_gateway_s500-20Match-
AND
broadcomsymantec_advanced_secure_gateway_s500-20_firmwareRange6.66.7.4.17
OR
broadcomsymantec_advanced_secure_gateway_s500-20_firmwareRange6.7.5.06.7.5.12
OR
broadcomsymantec_advanced_secure_gateway_s500-20_firmwareRange7.27.2.7.2
OR
broadcomsymantec_advanced_secure_gateway_s500-20_firmwareRange7.37.3.3.3

CNA Affected

[
  {
    "product": "Advanced Secure Gateway (ASG) and ProxySG",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "ASG 6.6, ASG 6.7 prior to 6.7.4.17 or 6.7.5.12, ASG 7.2 prior to 7.2.7.2, ASG 7.3 prior to 7.3.3.3, ProxySG 6.5 prior to 6.5.10.16, ProxySG 6.6 prior to 6.6.5.19, ProxySG 6.7 prior to 6.7.3.15, 6.7.4.17, or 6.7.5.12, ProxySG 7.2 prior 7.2.7.2, ProxySG 7.3 prior to 7.3.3.3."
      }
    ]
  }
]

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:P/I:P/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

71.3%

Related for CVE-2021-30648