Security Advisory Detail

OpenSSL Command Injection Vulnerability (CVE-2022-1292)

Advisory ID
WGSA-2022-00012
CVE
CVE-2022-1292
Impact
Medium
Status
Resolved
Product Family
Firebox, Dimension, WatchGuard Cloud, Secure Wi-Fi
Published Date
Updated Date
Workaround Available
True
CVSS Score
6.3
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Summary

On May 3 2022, OpenSSL published a security advisory disclosing a command injection vulnerability in the c_rehash script included with the library. Some operating systems automatically execute this script as a part of normal operations which could allow an attacker to execute arbitrary commands with elevated privileges.

WatchGuard is investigating its product line to determine which products or cloud services may be affected by this vulnerability.

Affected
Product Affected Version(s)
Firebox Not impacted
WSM Not impacted
Dimension Mitigated via automatically applied security updates
WatchGuard Cloud Not impacted
DNSWatch Resolved
Cloud Wi-Fi APs Not impacted
Endpoint Clients Not impacted
Resolution
Product Status Fixed Version(s)
Dimension Resolved Dimension automatically installs security updates and has updated OpenSSL to a non-vulnerable version
DNSwatch Resolved DNSWatch engineering deployed a fix to mitigate CVE-2022-1292 in our cloud environment
Advisory Product List
Product Family Product Branch Product List
Firebox
Fireware OS 12.x T20, T25, T40, T45, T55, T70, T80, T85, M270, M290, M370, M390, M470, M570, M590, M670, M690, M440, M4600, M4800, M5600, M5800, Firebox Cloud, Firebox NV5, FireboxV
Firebox
Fireware OS 12.5.x T15, T35
Dimension
Dimension Dimension
WatchGuard Cloud
WatchGuard Cloud WatchGuard Cloud
Secure Wi-Fi
Wi-Fi 4 & 5 AP125, AP225W, AP325, AP327X, AP420
Secure Wi-Fi
Wi-Fi 6 AP130, AP330, AP332CR, AP430CR, AP432