Multiple critical vulnerabilities have been reported in Symantec's Web Gateway.
The technology, the Symantec's Protection Suite, contained vulnerabilities that would allow an attacker to run arbitrary commands with the privileges of the “root”, user while an attacker could get unauthorized access to the appliance.
According to research by Austrian firm SEC Consult Vulnerability Lab, the flaws could have permitted visibility of web traffic, interception of HTTP and the plain text form of HTTPS traffic. If SSL deep inspection is enabled, the appliance holds a private key for a Certificate Authority (CA) which if compromised by an attacker, would allow arbitrary certificates to be signed.
It said: “The recommendation of SEC Consult is to switch off the product until a comprehensive security audit based on a security source code review has been performed and all identified security deficiencies have been resolved by the vendor.”
It said that there were six vulnerabilities in total that would allow: reflected cross-site scripting; persistent cross-site scripting; OS command injection; security misconfiguration; SQL Injection; and cross-site request forgery.
Symantec was informed of the flaws on the 22nd February and existed in version 22.214.171.124 of the Symantec Web Gateway, the most recent version at the time of discovery. Symantec releases an advisory and product update on Thursday 25th July and confirmed that previous versions were affected. It recommended users update to Symantec Web Gateway version 5.1.1.
Symantec thanked Wolfgang Ettlinger and Stefan Viehböck from SEC Consult for reporting five of the flaws, and Offensive Security for reporting CVE-2013-4673.
It said in an advisory: “Symantec engineers verified these issues and have released an update to address them. Symantec engineers continue to review related functionality to further enhance the overall security of Symantec Web Gateway.
“Symantec Security Response has released IPS signature 26812 – ‘Web Attack: Symantec Web Gateway XSS' to help detect and block remote exploit attempts. Signatures are available through normal Symantec security updates.”