Lucene search

K
symantecSymantec Security ResponseSMNTC-18331
HistoryJun 29, 2021 - 3:32 p.m.

Authentication Bypass in ASG and ProxySG

2021-06-2915:32:25
Symantec Security Response
65

0.005 Low

EPSS

Percentile

75.3%

Summary

The Symantec Advanced Secure Gateway (ASG) and ProxySG web management consoles are susceptible to an authentication bypass vulnerability. An unauthenticated attacker can execute arbitrary CLI commands, view/modify the appliance configuration and policy, and shutdown/restart the appliance.

Affected Product(s)

Advanced Secure Gateway (ASG)

CVE |Supported Version(s)|Remediation
CVE-2021-30648 | 6.6 | No longer under maintenance. Upgrade to 6.7.5.12
6.7 | Upgrade to 6.7.5.12 (recommended) or 6.7.4.17
7.2 | Upgrade to 7.2.7.2
7.3 | Upgrade to 7.3.3.3

ProxySG

CVE |Supported Version(s)|Remediation
CVE-2021-30648 | 6.5 | No longer under maintenance. Upgrade to 6.7.5.12 (recommended). A fix is also available in 6.5.10.16.
6.6 | No longer under maintenance. Upgrade to 6.7.5.12 (recommended). A fix is also available in 6.6.5.19.
6.7 | Upgrade to 6.7.5.12 (recommended), 6.7.4.17, or 6.7.3.15
7.2 | Upgrade to 7.2.7.2
7.3 | Upgrade to 7.3.3.3

**Additional Product Information **

At the time of this advisory’s publication, Broadcom is not aware of any evidence that CVE-2021-30648 is actively exploited in the wild.

Successful exploitation of CVE-2021-30648 to modify appliance configuration/policy, shut down or restart the appliance results in Event Log messages logged on ASG and ProxySG. Event Log messages starting with "Config admin at <remote-IP-address> ‘unknown’ " are considered to be indicators of compromise (IOCs).

For example:
2021-01-01 17:42:27-00:00UTC “Config admin at <remote-IP-address> ‘unknown’, enabled NTP” 0 140002:7D
2021-01-01 18:00:42-00:00UTC “Config admin at <remote-IP-address> ‘unknown’, installed new Local Policy File” 0 140002:7D
2021-01-01 01:45:36-00:00UTC “Config admin at <remote-IP-address> ‘unknown’, initiated restart regular” 0 140002:7D

Exploiting this vulnerability to execute CLI commands that do not modify the appliance configuration/policy, shut down or restart the appliance may not result in logging the same Event Log messages.

Issue Details

CVE-2021-30648

Severity / CVSS v3.1: | Critical / 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) References:| NVD: CVE-2021-30648 Impact:| Security control bypass Description: | An authentication bypass vulnerability in the ASG and ProxySG web management consoles allows a remote unauthenticated attacker to send crafted HTTP/HTTPS requests that bypass user authentication. The attacker can exploit this vulnerability to execute arbitrary CLI commands (through the web management console) in enable or configuration mode, view/modify the appliance configuration and policy, and shutdown/restart the appliance.

Mitigation

CVE-2021-30648 is exploitable in ASG and ProxySG only if the attacker can send HTTP/HTTPS requests to the web management console. Customers can mitigate this vulnerability using existing network infrastructure, such as network partitioning and firewalls, to restrict access to the web management console to a trusted network.

CVE-2021-30648 is not exploitable to perform arbitrary code execution. ASG and ProxySG only provide a restricted CLI and not a general operating system shell. The CLI commands an attacker can execute are restricted to the commands provided by the CLI.

Revisions

2021-06-29 initial public release

0.005 Low

EPSS

Percentile

75.3%

Related for SMNTC-18331