First published: Wed Aug 24 2016(Updated: )
WatchGuard RapidStream appliances allow local users to gain privileges and execute arbitrary commands via a crafted ifconfig command, aka ESCALATEPLOWMAN.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WatchGuard RapidStream |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7089 is classified as a high-severity vulnerability due to its potential for privilege escalation.
To fix CVE-2016-7089, upgrade to the latest firmware version provided by WatchGuard for RapidStream appliances.
CVE-2016-7089 affects local users of WatchGuard RapidStream appliances who have access to execute commands.
CVE-2016-7089 is associated with a local privilege escalation attack via a crafted ifconfig command.
No, CVE-2016-7089 requires local access to the device to be exploited.