First published: Thu Oct 05 2023(Updated: )
An issue was discovered in WatchGuard EPDR 8.0.21.0002. Due to a weak implementation of message handling between WatchGuard EPDR processes, it is possible to perform a Local Privilege Escalation on Windows by sending a crafted message to a named pipe.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Watchguard Epp Firmware | <8.00.22.0010 | |
Watchguard Epp | ||
Watchguard Edr Firmware | <8.00.22.0010 | |
Watchguard Edr | ||
Watchguard Epdr Firmware | <8.00.22.0010 | |
WatchGuard EPDR | ||
Watchguard Panda Ad360 Firmware | <8.00.22.0010 | |
Watchguard Panda Ad360 | ||
All of | ||
Watchguard Epp | ||
Watchguard Epp Firmware | <8.00.22.0010 | |
All of | ||
Watchguard Edr | ||
Watchguard Edr Firmware | <8.00.22.0010 | |
All of | ||
WatchGuard EPDR | ||
Watchguard Epdr Firmware | <8.00.22.0010 | |
All of | ||
Watchguard Panda Ad360 | ||
Watchguard Panda Ad360 Firmware | <8.00.22.0010 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue in WatchGuard EPDR is CVE-2023-26236.
The severity of CVE-2023-26236 is high with a severity value of 7.8.
The affected software versions are WatchGuard EPDR 8.0.21.0002 up to exclusive version 8.00.22.0010.
An attacker can exploit this vulnerability by sending a crafted message to a named pipe, leading to a local privilege escalation on Windows.
No, WatchGuard EPP and WatchGuard EDR are not vulnerable to CVE-2023-26236.