First published: Wed Jul 31 2013(Updated: )
The management console on the Symantec Web Gateway (SWG) appliance before 5.1.1 does not properly implement RADIUS authentication, which allows remote attackers to execute arbitrary code by leveraging access to the login prompt.
Credit: secure@symantec.com
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Web Gateway | <=5.1 | |
Symantec Web Gateway | =5.0 | |
Symantec Web Gateway | =5.0.1 | |
Symantec Web Gateway | =5.0.2 | |
Symantec Web Gateway | =5.0.3 | |
Symantec Web Gateway | =5.0.3.18 | |
Symantec Web Gateway Appliance 8450 | ||
Symantec Web Gateway Appliance 8490 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4673 is considered a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2013-4673, upgrade the Symantec Web Gateway appliance to version 5.1.1 or later.
CVE-2013-4673 affects Symantec Web Gateway versions prior to 5.1.1 and specific appliance models.
CVE-2013-4673 allows remote attackers to exploit the vulnerability via improper RADIUS authentication.
Yes, CVE-2013-4673 can be exploited by remote attackers if they have access to the management console.