Security Advisory Detail

OpenSSH Server 9.1 Double Free Vulnerability (CVE-2023-25136)

Advisory ID
WGSA-2023-00001
CVE
CVE-2023-25136
Impact
Medium
Status
Not Applicable
Product Family
Firebox, Dimension, WatchGuard Cloud, Secure Wi-Fi
Published Date
Updated Date
Workaround Available
False
CVSS Score
6.5
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
Summary

On February 3, 2023, researchers at Qualys disclosed CVE-2023-25136, a double free vulnerability in OpenSSH Server v9.1. The exploit is non-trivial but a successful exploit could allow an unauthenticated attacker to execute arbitrary code on an unprotected system.

Affected
Product Affected Version(s) Note
Firebox Not Impacted The Firebox does not use a vulnerable version of OpenSSH. Note, some vulnerability scanners may incorrectly report the Firebox's OpenSSH server as vulnerable
Dimension Not Impacted Dimension uses a patched version of OpenSSH that is not affected by this vulnerability
Resolution
Product Affected Version(s) Note
Firebox Not Impacted The Firebox does not use a vulnerable version of OpenSSH. Note, some vulnerability scanners may incorrectly report the Firebox's OpenSSH server as vulnerable
Dimension Not Impacted Dimension uses a patched version of OpenSSH that is not affected by this vulnerability
Advisory Product List
Product Family Product Branch Product List
Firebox
Fireware OS 12.x T20, T25, T40, T45, T55, T70, T80, T85, M270, M290, M370, M390, M470, M570, M590, M670, M690, M440, M4600, M4800, M5600, M5800, Firebox Cloud, Firebox NV5, FireboxV
Firebox
Fireware OS 12.5.x T15, T35
Dimension
Dimension Dimension
WatchGuard Cloud
WatchGuard Cloud WatchGuard Cloud
Secure Wi-Fi
Wi-Fi 4 & 5 AP125, AP225W, AP325, AP327X, AP420
Secure Wi-Fi
Wi-Fi 6 AP130, AP330, AP332CR, AP430CR, AP432