Vulnerabilites related to WatchGuard - Fireware OS
cve-2024-5974
Vulnerability from cvelistv5
Published
2024-07-09 02:24
Modified
2025-01-13 17:56
Severity ?
EPSS score ?
Summary
A buffer overflow in WatchGuard Fireware OS could may allow an authenticated remote attacker with privileged management access to execute arbitrary code with system privileges on the firewall.
This issue affects Fireware OS: from 11.9.6 through 12.10.3.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WatchGuard | Fireware OS |
Version: 11.9.6 ≤ 12.5.12+687697 Version: 12.6.0 ≤ 12.10.3 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fireware", "vendor": "watchguard", "versions": [ { "lessThanOrEqual": "12.5.12_Update1", "status": "affected", "version": "11.9.4", "versionType": "semver" }, { "lessThanOrEqual": "12.10.3", "status": "affected", "version": "12.6.0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5974", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-09T14:17:18.190367Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-09T14:32:08.765Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:25:03.188Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00011" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Fireware OS", "vendor": "WatchGuard", "versions": [ { "lessThanOrEqual": "12.5.12+687697", "status": "affected", "version": "11.9.6", "versionType": "semver" }, { "lessThanOrEqual": "12.10.3", "status": "affected", "version": "12.6.0", "versionType": "semver" } ] } ], "datePublic": "2024-06-27T05:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A buffer overflow in WatchGuard Fireware OS could may allow an authenticated remote attacker with privileged management access to execute arbitrary code with system privileges on the firewall.\u003cbr\u003e\u003cp\u003eThis issue affects Fireware OS: from 11.9.6 through 12.10.3.\u003c/p\u003e" } ], "value": "A buffer overflow in WatchGuard Fireware OS could may allow an authenticated remote attacker with privileged management access to execute arbitrary code with system privileges on the firewall.\nThis issue affects Fireware OS: from 11.9.6 through 12.10.3." } ], "impacts": [ { "capecId": "CAPEC-242", "descriptions": [ { "lang": "en", "value": "CAPEC-242 Code Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-13T17:56:13.317Z", "orgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "shortName": "WatchGuard" }, "references": [ { "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00011" } ], "source": { "advisory": "wgsa-2024-00011", "discovery": "INTERNAL" }, "title": "Firebox Authenticated Buffer Overflow Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "assignerShortName": "WatchGuard", "cveId": "CVE-2024-5974", "datePublished": "2024-07-09T02:24:47.924Z", "dateReserved": "2024-06-13T15:15:57.213Z", "dateUpdated": "2025-01-13T17:56:13.317Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-1239
Vulnerability from cvelistv5
Published
2025-02-14 13:21
Modified
2025-02-14 14:03
Severity ?
EPSS score ?
Summary
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS allows Stored XSS via the Blocked Sites list. This vulnerability requires an authenticated administrator session to a locally managed Firebox.This issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WatchGuard | Fireware OS |
Version: 12.0 ≤ 12.5.12+701324 Version: 12.6 ≤ 12.11 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-1239", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-14T14:02:35.988330Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-14T14:03:04.820Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Fireware OS", "vendor": "WatchGuard", "versions": [ { "lessThanOrEqual": "12.5.12+701324", "status": "affected", "version": "12.0", "versionType": "semver" }, { "lessThanOrEqual": "12.11", "status": "affected", "version": "12.6", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Simone Paganessi (https://www.linkedin.com/in/simonepaganessi)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in WatchGuard Fireware OS allows Stored XSS via the Blocked Sites list. This vulnerability requires an authenticated administrator session to a locally managed Firebox.\u003cp\u003eThis issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11.\u003c/p\u003e" } ], "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in WatchGuard Fireware OS allows Stored XSS via the Blocked Sites list. This vulnerability requires an authenticated administrator session to a locally managed Firebox.This issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11." } ], "impacts": [ { "capecId": "CAPEC-592", "descriptions": [ { "lang": "en", "value": "CAPEC-592 Stored XSS" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 4.8, "baseSeverity": "MEDIUM", "privilegesRequired": "HIGH", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "LOW", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-14T13:21:39.330Z", "orgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "shortName": "WatchGuard" }, "references": [ { "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00002" } ], "source": { "advisory": "WGSA-2025-00002", "discovery": "EXTERNAL" }, "title": "WatchGuard Firebox Stored Cross-Site-Scripting (XSS) Vulnerability in Blocked Sites List", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "assignerShortName": "WatchGuard", "cveId": "CVE-2025-1239", "datePublished": "2025-02-14T13:21:09.213Z", "dateReserved": "2025-02-11T19:40:39.287Z", "dateUpdated": "2025-02-14T14:03:04.820Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-1071
Vulnerability from cvelistv5
Published
2025-02-14 13:20
Modified
2025-02-14 14:05
Severity ?
EPSS score ?
Summary
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS allows Stored XSS via the spamBlocker module. This vulnerability requires an authenticated administrator session to a locally managed Firebox.This issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WatchGuard | Fireware OS |
Version: 12.0 ≤ 12.5.12+701324 Version: 12.6 ≤ 12.11 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-1071", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-14T14:04:09.605821Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-14T14:05:47.670Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Fireware OS", "vendor": "WatchGuard", "versions": [ { "lessThanOrEqual": "12.5.12+701324", "status": "affected", "version": "12.0", "versionType": "semver" }, { "lessThanOrEqual": "12.11", "status": "affected", "version": "12.6", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Simone Paganessi (https://www.linkedin.com/in/simonepaganessi)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in WatchGuard Fireware OS allows Stored XSS via the spamBlocker module. This vulnerability requires an authenticated administrator session to a locally managed Firebox.\u003cp\u003eThis issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11.\u003c/p\u003e" } ], "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in WatchGuard Fireware OS allows Stored XSS via the spamBlocker module. This vulnerability requires an authenticated administrator session to a locally managed Firebox.This issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11." } ], "impacts": [ { "capecId": "CAPEC-592", "descriptions": [ { "lang": "en", "value": "CAPEC-592 Stored XSS" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 4.8, "baseSeverity": "MEDIUM", "privilegesRequired": "HIGH", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "LOW", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-14T13:20:48.780Z", "orgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "shortName": "WatchGuard" }, "references": [ { "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00001" } ], "source": { "advisory": "WGSA-2025-00001", "discovery": "EXTERNAL" }, "title": "WatchGuard Firebox Stored Cross-Site-Scripting (XSS) Vulnerability in spamBlocker Module", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "assignerShortName": "WatchGuard", "cveId": "CVE-2025-1071", "datePublished": "2025-02-14T13:20:48.780Z", "dateReserved": "2025-02-05T22:05:32.462Z", "dateUpdated": "2025-02-14T14:05:47.670Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-0178
Vulnerability from cvelistv5
Published
2025-02-14 13:22
Modified
2025-02-14 14:01
Severity ?
EPSS score ?
Summary
Improper Input Validation vulnerability in WatchGuard Fireware OS allows an attacker to manipulate the value of the HTTP Host header in requests sent to the Web UI. An attacker could exploit this vulnerability to redirect users to malicious websites, poison the web cache, or inject malicious JavaScript into responses sent by the Web UI.
This issue affects Fireware OS: from 12.0 up to and including 12.11.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WatchGuard | Fireware OS |
Version: 12.0 ≤ 12.5.12+701324 Version: 12.6.0 ≤ 12.11 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0178", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-14T14:01:22.671243Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-14T14:01:35.532Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Fireware OS", "vendor": "WatchGuard", "versions": [ { "lessThanOrEqual": "12.5.12+701324", "status": "affected", "version": "12.0", "versionType": "semver" }, { "lessThanOrEqual": "12.11", "status": "affected", "version": "12.6.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Input Validation vulnerability in WatchGuard Fireware OS allows an attacker to manipulate the value of the HTTP Host header in requests sent to the Web UI. An attacker could exploit this vulnerability to redirect users to malicious websites, poison the web cache, or inject malicious JavaScript into responses sent by the Web UI.\u003cbr\u003e\u003cp\u003eThis issue affects Fireware OS: from 12.0 up to and including 12.11.\u003c/p\u003e" } ], "value": "Improper Input Validation vulnerability in WatchGuard Fireware OS allows an attacker to manipulate the value of the HTTP Host header in requests sent to the Web UI. An attacker could exploit this vulnerability to redirect users to malicious websites, poison the web cache, or inject malicious JavaScript into responses sent by the Web UI.\nThis issue affects Fireware OS: from 12.0 up to and including 12.11." } ], "impacts": [ { "capecId": "CAPEC-141", "descriptions": [ { "lang": "en", "value": "CAPEC-141 Cache Poisoning" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.1, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "LOW", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "LOW", "userInteraction": "ACTIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:L/SI:L/SA:L", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-14T13:22:22.237Z", "orgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "shortName": "WatchGuard" }, "references": [ { "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00003" } ], "source": { "advisory": "WGSA-2025-00003", "discovery": "EXTERNAL" }, "title": "WatchGaurd Firebox Host Header Injection Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "assignerShortName": "WatchGuard", "cveId": "CVE-2025-0178", "datePublished": "2025-02-14T13:22:22.237Z", "dateReserved": "2025-01-02T19:07:31.451Z", "dateUpdated": "2025-02-14T14:01:35.532Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31749
Vulnerability from cvelistv5
Published
2025-01-27 23:28
Modified
2025-01-28 15:18
Severity ?
EPSS score ?
Summary
An argument injection vulnerability in the diagnose and import pac commands in WatchGuard Fireware OS before 12.8.1, 12.1.4, and 12.5.10 allows an authenticated remote attacker with unprivileged credentials to upload or read files to limited, arbitrary locations on WatchGuard Firebox and XTM appliances
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WatchGuard | Fireware OS |
Version: 0 < 12.8.1 Version: 12.x < 12.1.4 Version: 12.2.x < 12.5.x Version: 12.5.10 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2022-31749", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T15:09:59.502452Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-28T15:18:35.068Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Fireware OS", "vendor": "WatchGuard", "versions": [ { "lessThan": "12.8.1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "12.1.4", "status": "affected", "version": "12.x", "versionType": "custom" }, { "lessThan": "12.5.x", "status": "affected", "version": "12.2.x", "versionType": "custom" }, { "status": "affected", "version": "12.5.10", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Jake Baines, Rapid7" } ], "datePublic": "2022-06-23T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(248, 248, 248);\"\u003eAn argument injection vulnerability in the \u003c/span\u003e\u003ctt\u003e\u003cspan style=\"background-color: rgb(248, 248, 248);\"\u003ediagnose\u003c/span\u003e\u003c/tt\u003e\u003cspan style=\"background-color: rgb(248, 248, 248);\"\u003e and \u003c/span\u003e\u003ctt\u003e\u003cspan style=\"background-color: rgb(248, 248, 248);\"\u003eimport pac\u003c/span\u003e\u003c/tt\u003e\u003cspan style=\"background-color: rgb(248, 248, 248);\"\u003e commands in WatchGuard Fireware OS before 12.8.1, 12.1.4, and 12.5.10 allows \u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ean authenticated remote attacker with unprivileged credentials to upload or read files to limited, arbitrary locations on WatchGuard Firebox and XTM appliances\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "An argument injection vulnerability in the diagnose and import pac commands in WatchGuard Fireware OS before 12.8.1, 12.1.4, and 12.5.10 allows an authenticated remote attacker with unprivileged credentials to upload or read files to limited, arbitrary locations on WatchGuard Firebox and XTM appliances" } ], "impacts": [ { "capecId": "CAPEC-6", "descriptions": [ { "lang": "en", "value": "CAPEC-6 Argument Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-88", "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-27T23:29:05.736Z", "orgId": "9974b330-7714-4307-a722-5648477acda7", "shortName": "rapid7" }, "references": [ { "url": "https://www.rapid7.com/blog/post/2022/06/23/cve-2022-31749-watchguard-authenticated-arbitrary-file-read-write-fixed/" }, { "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00019" } ], "source": { "discovery": "EXTERNAL" }, "title": "Authenticated arbitrary file read/write in WatchGuard Fireware OS", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9974b330-7714-4307-a722-5648477acda7", "assignerShortName": "rapid7", "cveId": "CVE-2022-31749", "datePublished": "2025-01-27T23:28:40.596Z", "dateReserved": "2022-05-26T17:58:55.663Z", "dateUpdated": "2025-01-28T15:18:35.068Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }