Lucene search

K
symantecSymantec Security ResponseSMNTC-1401
HistoryApr 03, 2017 - 8:00 a.m.

SA138 : OS Command Injection Vulnerability in ASG and CA

2017-04-0308:00:00
Symantec Security Response
14

EPSS

0.015

Percentile

87.2%

SUMMARY

The ASG and CA web-based management consoles are susceptible to an OS command injection vulnerability. An authenticated malicious administrator can execute arbitrary OS commands with elevated system privileges.

AFFECTED PRODUCTS

Advanced Secure Gateway (ASG)

CVE |Affected Release(s)|Remediation
All CVEs | 6.7 | Not vulnerable, fixed in 6.7.2.1
6.6 | Upgrade to 6.6.5.4.

Content Analysis (CA)

CVE |Affected Release(s)|Remediation
All CVEs | 2.1 and later | Not vulnerable, fixed in 2.1.1.1
1.3 | Upgrade to 1.3.7.4.

ADDITIONAL PRODUCT INFORMATION

This vulnerability can be exploited only through the ASG and CA management interfaces. Symantec recommends that customers deploy the ASG and CA appliances in a secure network and restrict access to the management interface. Not deploying the appliance in a secure network or restricting management interface access increases the threat of exploiting the vulnerability.

ISSUES

CVE-2016-9091

Severity / CVSSv2 | High / 7.7 (AV:A/AC:L/Au:S/C:C/I:C/A:C) References| SecurityFocus: BID 97372 / NVD: CVE-2016-9091 Impact| OS command injection Severity | The ASG and CA management consoles are susceptible to an OS command injection vulnerability. An authenticated malicious administrator can execute arbitrary OS commands with the privileges of the management console service. The malicious administrator can also elevate their privileges and execute OS commands with root privileges.

MITIGATION

Symantec recommends that customers deploy the ASG and CA appliances in a secure network and restrict access to the management interface.

ACKNOWLEDGEMENTS

Thanks to Peter Paccione, Chris Hebert, and Corey Boyd for reporting this vulnerability.

REVISION

2019-01-17 Advisory Status moved to Closed.
2017-11-06 ASG 6.7 is not vulnerable.
2017-05-18 CAS 2.1 is not vulnerable.
2017-04-03 initial public release