First published: Thu Jul 07 2022(Updated: )
Symantec Advanced Secure Gateway (ASG) and ProxySG are susceptible to an HTTP desync vulnerability. When a remote unauthenticated attacker and other web clients communicate through the proxy with the same web server, the attacker can send crafted HTTP requests and cause the proxy to forward web server responses to unintended clients. Severity/CVSSv3: High / 8.1 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Credit: secure@symantec.com secure@symantec.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Advanced Secure Gateway | =6.7 | |
Broadcom Advanced Secure Gateway | =7.3 | |
Broadcom Proxysg | =6.7 | |
Broadcom Proxysg | =7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-46825 is an HTTP desync vulnerability in Symantec Advanced Secure Gateway (ASG) and ProxySG.
The severity of CVE-2021-46825 is critical, with a severity score of 9.1.
CVE-2021-46825 affects Broadcom Advanced Secure Gateway versions 6.7 and 7.3, as well as Broadcom Proxysg versions 6.7 and 7.3.
CVE-2021-46825 allows a remote unauthenticated attacker to send crafted HTTP requests through the proxy, causing it to forward web server responses or cache them incorrectly.
To fix CVE-2021-46825, it is recommended to apply the patches or updates provided by Broadcom and follow any mitigation steps provided in the security advisory.