Security Advisory Detail

Apache Struts Remote Code Execution Vulnerability (CVE-2023-50164)

Advisory ID
WGSA-2023-00009
CVE
CVE-2023-50164
Impact
Critical
Status
Not Applicable
Product Family
Firebox, Dimension, WatchGuard Cloud, Secure Wi-Fi
Published Date
Updated Date
Workaround Available
True
CVSS Score
9.8
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary

On December 7th, The Apache Software Foundation disclosed a path traversal vulnerability in the Apache Struts library which could lead to attackers gaining remote code execution with a carefully crafted file upload parameter.

Affected
Product Affected Version(s) Note
Firebox Not Impacted The Firebox does not use Apache Struts
WatchGuard System Manager Not Impacted WSM does not use Apache Struts
Dimension Not Impacted Dimension does not use Apache Struts
WatchGuard Cloud Not Impacted WatchGuard Cloud and its components do not use Apache Struts
DNSWatch Not Impacted DNSWatch does not use Apache Struts
Endpoint Not Impacted WatchGuard Endpoint products (including AD360 and EPRD) do not use Apache Struts)
Cloud Wi-Fi APs Not Impacted WatchGuard Cloud-managed Wi-Fi APs do not use Apache Struts
Advisory Product List
Product Family Product Branch Product List
Firebox
Fireware OS 12.x T20, T25, T40, T45, T55, T70, T80, T85, M270, M290, M370, M390, M470, M570, M590, M670, M690, M440, M4600, M4800, M5600, M5800, Firebox Cloud, Firebox NV5, FireboxV
Firebox
Fireware OS 12.5.x T15, T35
Dimension
Dimension Dimension
WatchGuard Cloud
WatchGuard Cloud WatchGuard Cloud
Secure Wi-Fi
Wi-Fi 4 & 5 AP125, AP225W, AP325, AP327X, AP420
Secure Wi-Fi
Wi-Fi 6 AP130, AP330, AP332CR, AP430CR, AP432