CVE-2022-25291
Published Feb 24, 2022
Last updated 3 years ago
Overview
- Description
- An integer overflow in WatchGuard Firebox and XTM appliances allows an authenticated remote attacker to trigger a heap-based buffer overflow and potentially execute arbitrary code by initiating a firmware update with a malicious upgrade image. This vulnerability impacts Fireware OS before 12.7.2_U2, 12.x before 12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-190
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7C2E450-C7DC-40F4-928C-2323428E4DF4", "versionEndExcluding": "12.1.3", "versionStartIncluding": "12.0.0" }, { "criteria": "cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE9EB306-8BF2-4904-ACA5-5938844CB0A9", "versionEndExcluding": "12.5.9", "versionStartIncluding": "12.2.0" }, { "criteria": "cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D684DF8B-6F0B-4189-B7B5-79A09ABCE0F0", "versionEndExcluding": "12.7.2", "versionStartIncluding": "12.7.0" }, { "criteria": "cpe:2.3:o:watchguard:fireware:12.1.3:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F3E6444-AA30-4F87-AB97-12601CEDF14E" }, { "criteria": "cpe:2.3:o:watchguard:fireware:12.1.3:u1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "48106213-C927-4232-A95F-4E6962E72BF9" }, { "criteria": "cpe:2.3:o:watchguard:fireware:12.1.3:u2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB0676CA-E9BF-4CB8-99D2-7FA0ACC711EA" }, { "criteria": "cpe:2.3:o:watchguard:fireware:12.1.3:u3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE1BB0F7-72F1-4601-A1E2-161FCA8819B8" }, { "criteria": "cpe:2.3:o:watchguard:fireware:12.1.3:u4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "583E164A-E308-4666-84AF-E0ADC16427B4" }, { "criteria": "cpe:2.3:o:watchguard:fireware:12.1.3:u5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B310FA82-61C6-4D40-A263-789223301513" }, { "criteria": "cpe:2.3:o:watchguard:fireware:12.1.3:u6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49901BE7-00EA-4180-BC45-CBBFEC295A31" }, { "criteria": "cpe:2.3:o:watchguard:fireware:12.1.3:u7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E842BF2-3C47-4C9B-8BA1-B448A2835E0A" }, { "criteria": "cpe:2.3:o:watchguard:fireware:12.5.9:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9586510-0B33-45C9-8550-206791E3C0D6" }, { "criteria": "cpe:2.3:o:watchguard:fireware:12.5.9:u1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B345B31-2DC2-49C5-8AC1-A4B12A5B679B" }, { "criteria": "cpe:2.3:o:watchguard:fireware:12.7.2:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA32519C-7B8B-4270-BBAD-7CAFAD28AA5E" }, { "criteria": "cpe:2.3:o:watchguard:fireware:12.7.2:u1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF8ECE0C-9997-42EB-A983-B930EA4D10E4" } ], "operator": "OR" } ] } ]