7.5
CVSSv2

CVE-2022-26318

Published: 04/03/2022 Updated: 08/08/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

On WatchGuard Firebox and XTM appliances, an unauthenticated user can execute arbitrary code, aka FBX-22786. This vulnerability impacts Fireware OS prior to 12.7.2_U2, 12.x prior to 12.1.3_U8, and 12.2.x up to and including 12.5.x prior to 12.5.9_U2.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

watchguard fireware

watchguard fireware 12.1.3

watchguard fireware 12.7.2

watchguard fireware 12.5.9

Exploits

This Metasploit module exploits a buffer overflow at the administration interface (8080 or 4117) of WatchGuard Firebox and XTM appliances which is built from a cherrypy python backend sending XML-RPC requests to a C binary called wgagent using pre-authentication endpoint /agent/login This vulnerability impacts Fireware OS before 1272_U2, 12x be ...

Github Repositories

watchguard_cve-2022-26318 Watchguard RCE POC CVE-2022-26318 #!/usr/bin/python3 -- coding: utf-8 -- CVE-2022-26318 import socket import ssl import gzip Remote WatchGuard XTM or FireWare OS R_HOST = "1111" Local host with nc listener: nc -l 8888 8888 L_HOST = "8888" def buildPayload(L_HOST): payload = "agentlogin<"encode() payload +

Watchguard RCE POC CVE-2022-26318

Watchguard-RCE-POC-CVE-2022-26318 Watchguard RCE POC CVE-2022-26318 The CVE for this issue is CVE-2022-26318