OpenSSL CVE-2022-3602 and CVE-2022-3786
Updated 2 November 2022, 12:22 PDT: Added response for Endpoint products
On 1 November 2022, OpenSSL disclosed CVE-2022-3602 and CVE-2022-3786, two high severity buffer overflow vulnerabilities in certificate validation present in OpenSSL 3.0.x up to and including 3.0.6. An attacker could exploit either vulnerability with a maliciously-crafted certificate that has been signed by a trusted certificate authority.
Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors have led this to be downgraded to HIGH.
Product | Affected Version(s) | Note |
---|---|---|
Firebox | Not Impacted | The Firebox does not use a vulnerable version of OpenSSL |
WSM | Not Impacted | WSM does not use a vulnerable version of OpenSSL |
Dimension | Not Impacted | Dimension does not use a vulnerable version of OpenSSL |
Cloud Wi-Fi APs | Not Impacted | WatchGuard APs do not use a vulnerable version of OpenSSL |
Endpoint | Not Impacted | WatchGuard EPDR and Panda AD360 do not use a vulnerable version of OpenSSL |
Product | Affected Version(s) | Note |
---|---|---|
Firebox | Not Impacted | The Firebox does not use a vulnerable version of OpenSSL |
WSM | Not Impacted | WSM does not use a vulnerable version of OpenSSL |
Dimension | Not Impacted | Dimension does not use a vulnerable version of OpenSSL |
Cloud Wi-Fi APs | Not Impacted | WatchGuard APs do not use a vulnerable version of OpenSSL |
Endpoint | Not Impacted | WatchGuard EPDR and Panda AD360 do not use a vulnerable version of OpenSSL |