OpenSSL Vulnerabilities Mar 2021

ASG-S200

12 more products

17849

10 January 2022

07 April 2021

OPEN

High

7.4

Summary

Symantec Network and Information Security (NIS) products using affected versions of OpenSSL may be susceptible to two vulnerabilities. A remote attacker may be able to cause denial of service through application crashes. An application may successfully validate an invalid X.509 certificate chain, which may result in improper authentication or man-in-the-middle (MITM) attacks.

Affected Product(s)

The following products and product versions are vulnerable to the CVEs listed. If a CVE is not listed, the product or version is not known to be vulnerable to it.

Advanced Secure Gateway (ASG)
CVE Supported Version(s) Remediation
CVE-2021-3449 7.2 Remediation is not available at this time.
7.3 Upgrade to 7.3.4.1.

 

ProxySG
CVE Supported Version(s) Remediation
CVE-2021-3449 7.2 Remediation is not available at this time.
7.3 Upgrade to 7.3.4.1.

 

Additional Product Information

The following products are not vulnerable:
AuthConnector
BCAAA
Content Analysis (CA)
HSM Agent
General Auth Connector Login Application
Management Center (MC)
PacketShaper (PS) S-Series
PolicyCenter (PC) S-Series
Reporter
Security Analytics
SSL Visibility (SSLV)
Symantec Messaging Gateway (SMG)
Web Isolation (WI) 
WSS Agent

WSS Mobile Agent

Issue Details

CVE-2021-3449
Severity / CVSS v3.1: Medium / 5.3 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
References: NVD: CVE-2021-3449
Impact: Security control bypass
Description: A flaw in TLS v1.2 renegotiation handling allows a remote attacker to send crafted renegotiation requests and cause denial of service through application crashes.

 

CVE-2021-3450
Severity / CVSS v3.1: High / 7.4 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)
References: NVD: CVE-2021-3450
Impact: Denial of service
Description: A flaw in certificate validation handling may cause an application to ignore CA certificate check results and successfully validate an invalid certificate chain. This may result in improper authentication of remote application or man-in-the-middle (MITM) attacks.

 

References

OpenSSL Security Advisory [25 March 2021] - https://www.openssl.org/news/secadv/20210325.txt

Revisions

2021-09-03 WI 1.14 is not vulnerable.
2021-08-27 A fix for CVE-2021-3449 in ASG 7.3 and ProxySG 7.3 is available in 7.3.4.1. WI 1.15 is not vulnerable.  WI 1.14 is under investigation.
2021-04-22 ASG 6.7 and ProxySG 6.7 are not vulnerable.
2021-04-07 initial public release