SB2022030458 - Multiple vulnerabilities in WatchGuard Fireware OS



SB2022030458 - Multiple vulnerabilities in WatchGuard Fireware OS

Published: March 4, 2022 Updated: December 16, 2025

Security Bulletin ID SB2022030458
Severity
Critical
Patch available
YES
Number of vulnerabilities 7
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 14% High 14% Medium 71%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 7 secuirty vulnerabilities.


1) OS Command Injection (CVE-ID: CVE-2022-26318)

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation. A remote unauthenticated attacker can send a specially crafted XML-RPC request to the /agent/ endpoint and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-25290)

The vulnerability allows a remote user to obtain private certificate keys.

The vulnerability exists due to missing permissions checks. A remote authenticated user can retrieve certificate private keys.


3) Integer overflow (CVE-ID: CVE-2022-25291)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow. A remote user can initiate a firmware update with a malicious upgrade image, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


4) Stack-based buffer overflow (CVE-ID: CVE-2022-25292)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in wgagent. A remote user can initiate a firmware update with a malicious upgrade image, trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


5) Stack-based buffer overflow (CVE-ID: CVE-2022-25293)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in systemd. A remote user can initiate a firmware update with a malicious upgrade image, trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


6) Arbitrary file upload (CVE-ID: CVE-2022-25360)

The vulnerability allows a remote user to compromise vulnerable system.

The vulnerability exists due to insufficient validation of file during file upload. A remote user can upload a malicious file and execute it on the server.


7) Improper access control (CVE-ID: CVE-2022-25363)

The vulnerability allows a remote user to modify credentials of other users.

The vulnerability exists due to improper access restrictions. A remote user can modify privileged management user credentials and compromise the affected system.


Remediation

Install update from vendor's website.