- Description
- An authentication bypass vulnerability in Skyhigh SWG in main releases 10.x prior to 10.2.12, 9.x prior to 9.2.23, 8.x prior to 8.2.28, and controlled release 11.x prior to 11.2.1 allows a remote attacker to bypass authentication into the administration User Interface. This is possible because of SWG incorrectly whitelisting authentication bypass methods and using a weak crypto password. This can lead to the attacker logging into the SWG admin interface, without valid credentials, as the super user with complete control over the SWG.
- Source
- trellixpsirt@trellix.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:skyhighsecurity:secure_web_gateway:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "73A222C2-0A68-453F-A336-AEE5FC3A2CA8",
"versionEndExcluding": "8.2.28",
"versionStartIncluding": "8.0.0"
},
{
"criteria": "cpe:2.3:a:skyhighsecurity:secure_web_gateway:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "16F667F1-11C1-4E70-8924-A103D827FCEF",
"versionEndExcluding": "9.2.23",
"versionStartIncluding": "9.0.0"
},
{
"criteria": "cpe:2.3:a:skyhighsecurity:secure_web_gateway:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "08DC52C1-4CDE-41B3-AFB4-9904B1D23349",
"versionEndExcluding": "10.2.12",
"versionStartIncluding": "10.0.0"
},
{
"criteria": "cpe:2.3:a:skyhighsecurity:secure_web_gateway:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CDD760BD-58E4-46CB-BC53-1E2FB065C23C",
"versionEndExcluding": "11.2.1",
"versionStartIncluding": "11.0.0"
}
],
"operator": "OR"
}
]
}
]