SA138 : OS Command Injection Vulnerability in ASG and CA

1401

04 May 2021

03 April 2017

CLOSED

HIGH

CVSS v2: 7.7

SUMMARY

 

The ASG and CA web-based management consoles are susceptible to an OS command injection vulnerability.  An authenticated malicious administrator can execute arbitrary OS commands with elevated system privileges.

AFFECTED PRODUCTS

 

Advanced Secure Gateway (ASG)
CVE Affected Release(s) Remediation
All CVEs 6.7 Not vulnerable, fixed in 6.7.2.1
6.6 Upgrade to 6.6.5.4.

 

Content Analysis (CA)
CVE Affected Release(s) Remediation
All CVEs 2.1 and later Not vulnerable, fixed in 2.1.1.1
1.3 Upgrade to 1.3.7.4.

 

ADDITIONAL PRODUCT INFORMATION

 

This vulnerability can be exploited only through the ASG and CA management interfaces.  Symantec recommends that customers deploy the ASG and CA appliances in a secure network and restrict access to the management interface.  Not deploying the appliance in a secure network or restricting management interface access increases the threat of exploiting the vulnerability.

ISSUES

 

CVE-2016-9091
Severity / CVSSv2 High / 7.7 (AV:A/AC:L/Au:S/C:C/I:C/A:C)
References SecurityFocus: BID 97372 / NVD: CVE-2016-9091
Impact OS command injection
Severity The ASG and CA management consoles are susceptible to an OS command injection vulnerability.  An authenticated malicious administrator can execute arbitrary OS commands with the privileges of the management console service.  The malicious administrator can also elevate their privileges and execute OS commands with root privileges.

 

MITIGATION

 

Symantec recommends that customers deploy the ASG and CA appliances in a secure network and restrict access to the management interface.

ACKNOWLEDGEMENTS

 

Thanks to Peter Paccione, Chris Hebert, and Corey Boyd for reporting this vulnerability.

REVISION

 

2019-01-17 Advisory Status moved to Closed.
2017-11-06 ASG 6.7 is not vulnerable.
2017-05-18 CAS 2.1 is not vulnerable.
2017-04-03 initial public release