OpenSSH Server 9.1 Double Free Vulnerability (CVE-2023-25136)
Advisory ID
WGSA-2023-00001
CVE
CVE-2023-25136
Impact
Medium
Status
Not Applicable
Product Family
Firebox,
Dimension,
WatchGuard Cloud,
Secure Wi-Fi
Published Date
Updated Date
Workaround Available
False
CVSS Score
6.5
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
Summary
On February 3, 2023, researchers at Qualys disclosed CVE-2023-25136, a double free vulnerability in OpenSSH Server v9.1. The exploit is non-trivial but a successful exploit could allow an unauthenticated attacker to execute arbitrary code on an unprotected system.
Affected
Product | Affected Version(s) | Note |
---|---|---|
Firebox | Not Impacted | The Firebox does not use a vulnerable version of OpenSSH. Note, some vulnerability scanners may incorrectly report the Firebox's OpenSSH server as vulnerable |
Dimension | Not Impacted | Dimension uses a patched version of OpenSSH that is not affected by this vulnerability |
Resolution
Product | Affected Version(s) | Note |
---|---|---|
Firebox | Not Impacted | The Firebox does not use a vulnerable version of OpenSSH. Note, some vulnerability scanners may incorrectly report the Firebox's OpenSSH server as vulnerable |
Dimension | Not Impacted | Dimension uses a patched version of OpenSSH that is not affected by this vulnerability |
Advisory Product List
Product Family | Product Branch | Product List |
---|---|---|
Firebox
|
Fireware OS 12.x | T20, T25, T40, T45, T55, T70, T80, T85, M270, M290, M370, M390, M470, M570, M590, M670, M690, M440, M4600, M4800, M5600, M5800, Firebox Cloud, Firebox NV5, FireboxV |
Firebox
|
Fireware OS 12.5.x | T15, T35 |
Dimension
|
Dimension | Dimension |
WatchGuard Cloud
|
WatchGuard Cloud | WatchGuard Cloud |
Secure Wi-Fi
|
Wi-Fi 4 & 5 | AP125, AP225W, AP325, AP327X, AP420 |
Secure Wi-Fi
|
Wi-Fi 6 | AP130, AP330, AP332CR, AP430CR, AP432 |