First published: Tue Sep 06 2022(Updated: )
A stored cross-site scripting (XSS) vulnerability exists in the management web interface of WatchGuard Firebox and XTM appliances. A remote attacker can potentially execute arbitrary JavaScript code in the management web interface by sending crafted requests to exposed management ports. This is fixed in Fireware OS 12.8.1, 12.5.10, and 12.1.4.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WatchGuard Fireware | >=12.0.0<12.1.4 | |
WatchGuard Fireware | >=12.2.0<12.5.10 | |
WatchGuard Fireware | =12.6.1-u1 | |
WatchGuard Fireware | =12.6.1-u3 | |
WatchGuard Fireware | =12.6.3 | |
WatchGuard Fireware | =12.6.4 | |
WatchGuard Fireware | =12.7.0-u1 | |
WatchGuard Fireware | =12.7.1 | |
WatchGuard Fireware | =12.7.2-u2 | |
WatchGuard Fireware | =12.8.0-u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31792 is a stored cross-site scripting (XSS) vulnerability that exists in the management web interface of WatchGuard Firebox and XTM appliances.
CVE-2022-31792 affects WatchGuard Fireware versions 12.0.0 to 12.1.4, 12.2.0 to 12.5.10, 12.6.1-u1, 12.6.1-u3, 12.6.3, 12.6.4, 12.7.0-u1, 12.7.1, 12.7.2-u2, and 12.8.0-u1.
The severity of CVE-2022-31792 is medium with a CVSS score of 5.4.
To fix CVE-2022-31792, it is recommended to update WatchGuard Fireware to a version that is not affected by the vulnerability.
You can find more information about CVE-2022-31792 in the advisory published by WatchGuard at https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00014.