OpenSSH regreSSHion (CVE-2024-6387)
Updated August 1 2024: Updated to confirm Fireware OS 12.10.4 Update 1 resolves this issue
Updated July 2 2024: Updated to confirm WatchGuard Dimension is not affected by this vulnerability.
On July 1, Qualys published information about a race condition vulnerability in certain OpenSSH Server implementations when used on glibc-based linux systems. An unauthenticated attacker could exploit this vulnerability to execute arbitrary code with privileged permissions on affected systems.
WatchGuard Firebox appliances use a vulnerable version of OpenSSH for the Management Command Line Interface and our initial assessment is that they affected by this vulnerability.
WatchGuard Wireless Access Points do not use OpenSSH and are not affected by this vulnerability.
WatchGuard Dimension uses a version of OpenSSH that is not affected by this vulnerability.
Product | Affected |
---|---|
WatchGuard Fireware OS | Affected* |
WatchGuard Wireless Access Points | Not Affected |
WatchGuard Dimension | Not Affected |
* Fireware OS 12.5.12 Update 1 uses a version of OpenSSH that is not vulnerable to CVE-2024-6387 and is not affected
Product | Resolution |
---|---|
WatchGuard Fireware OS | Fireware OS 12.10.4 Update 1 |
WatchGuard Firebox administrators should never expose management access, including the management CLI over SSH, to the internet or untrusted networks. See our published guidance on secure remote management options instead. Firebox administrators that do not use the management CLI over SSH can also add an explicit "Deny" firewall rule that blocks inbound TCP/4118 to the Firebox alias, placing it higher in the policy order than the default "WatchGuard" firewall management policy.
WatchGuard Wi-Fi Access Point administrators should limit access to the management CLI by enabling the management VLAN on a dedicated management network.