Apache Struts Remote Code Execution Vulnerability (CVE-2023-50164)
On December 7th, The Apache Software Foundation disclosed a path traversal vulnerability in the Apache Struts library which could lead to attackers gaining remote code execution with a carefully crafted file upload parameter.
Product | Affected Version(s) | Note |
---|---|---|
Firebox | Not Impacted | The Firebox does not use Apache Struts |
WatchGuard System Manager | Not Impacted | WSM does not use Apache Struts |
Dimension | Not Impacted | Dimension does not use Apache Struts |
WatchGuard Cloud | Not Impacted | WatchGuard Cloud and its components do not use Apache Struts |
DNSWatch | Not Impacted | DNSWatch does not use Apache Struts |
Endpoint | Not Impacted | WatchGuard Endpoint products (including AD360 and EPRD) do not use Apache Struts) |
Cloud Wi-Fi APs | Not Impacted | WatchGuard Cloud-managed Wi-Fi APs do not use Apache Struts |
Product Family | Product Branch | Product List |
---|---|---|
Firebox
|
Fireware OS 12.x | T20, T25, T40, T45, T55, T70, T80, T85, M270, M290, M370, M390, M470, M570, M590, M670, M690, M440, M4600, M4800, M5600, M5800, Firebox Cloud, Firebox NV5, FireboxV |
Firebox
|
Fireware OS 12.5.x | T15, T35 |
Dimension
|
Dimension | Dimension |
WatchGuard Cloud
|
WatchGuard Cloud | WatchGuard Cloud |
Secure Wi-Fi
|
Wi-Fi 4 & 5 | AP125, AP225W, AP325, AP327X, AP420 |
Secure Wi-Fi
|
Wi-Fi 6 | AP130, AP330, AP332CR, AP430CR, AP432 |