Vulnerability Description
WatchGuard RapidStream appliances allow local users to gain privileges and execute arbitrary commands via a crafted ifconfig command, aka ESCALATEPLOWMAN.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Watchguard | Rapidstream | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/138393/ESCALATEPLOWMAN-WatchGuard-PrivilegeExploitThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/92638
- https://www.exploit-db.com/exploits/40270/ExploitThird Party AdvisoryVDB Entry
- https://www.secplicity.org/2016/08/16/nsa-equation-group-exploit-leak-mean/Third Party Advisory
- http://packetstormsecurity.com/files/138393/ESCALATEPLOWMAN-WatchGuard-PrivilegeExploitThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/92638
- https://www.exploit-db.com/exploits/40270/ExploitThird Party AdvisoryVDB Entry
- https://www.secplicity.org/2016/08/16/nsa-equation-group-exploit-leak-mean/Third Party Advisory
FAQ
What is CVE-2016-7089?
CVE-2016-7089 is a vulnerability with a CVSS score of 7.8 (HIGH). WatchGuard RapidStream appliances allow local users to gain privileges and execute arbitrary commands via a crafted ifconfig command, aka ESCALATEPLOWMAN.
How severe is CVE-2016-7089?
CVE-2016-7089 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-7089?
Check the references section above for vendor advisories and patch information. Affected products include: Watchguard Rapidstream.