Critical Vulnerabilities Discovered in WatchGuard and Panda Security Products; Patched Versions Released

In a concerning development, security researchers have recently uncovered critical vulnerabilities in WatchGuard and Panda Security products. These vulnerabilities could potentially allow attackers to cause denial of service (DoS) conditions or execute arbitrary code with system privileges. The vulnerabilities specifically affect the Panda Kernel Memory Access driver (pskmad_64.sys), which is installed alongside WatchGuard EPDR, Panda AD360, and Panda Dome for Windows. In response to these findings, the companies have promptly released patched versions to address the vulnerabilities.

Vulnerabilities in WatchGuard and Panda Security Products

The vulnerable products include WatchGuard EDR, Panda AD360, and Panda Dome for Windows. These products are commonly used by organizations for endpoint protection and security management.

The vulnerabilities arise from issues within the Panda Kernel Memory Access driver (pskmad_64.sys), which is responsible for handling kernel-level memory operations. This driver, when compromised, could lead to serious security breaches and compromise the overall system integrity.

Vulnerability 1: CVE-2023-6330 – Memory Pool Overflow Defect

The first vulnerability, identified as CVE-2023-6330, is characterized as a memory pool overflow defect. If exploited, it allows an attacker to overflow the allocated kernel memory pool.

The driver fails to adequately validate the contents of specific registry values related to the operating system (OS) version. This oversight enables an attacker to inject maliciously crafted content into the registry, ultimately leading to the overflow of kernel memory.

Exploiting this vulnerability could result in the execution of arbitrary code with system privileges. However, it is important to note that successful exploitation of this vulnerability requires authentication with administrative privileges.

Vulnerability 2: CVE-2023-6331 – Out-of-Bounds Write Issue

The second vulnerability, identified as CVE-2023-6331, is an out-of-bounds write issue that also results in a kernel memory overflow.

An attacker can exploit this vulnerability by sending a specifically crafted packet via an I/O Request Packet (IRP) request with a particular IOCTL code. This action potentially leads to an overflow in the non-paged memory area, resulting in compromised system security.

Similar to the first vulnerability, successful exploitation of CVE-2023-6331 could result in arbitrary code execution with system privileges. However, authentication with administrative privileges is still necessary for the attacker to carry out the exploit.

Authentication Requirements for Exploiting the Vulnerabilities

To successfully exploit both vulnerabilities, an attacker must possess administrative privileges. This requirement acts as a protective measure, making it challenging for malicious actors to leverage the vulnerabilities without already having elevated access rights.

The need for administrative privileges adds an extra layer of protection, particularly in environments where proper access control and user privilege management are enforced. Organizations that strictly adhere to user privilege segregation can potentially mitigate the risks associated with these vulnerabilities.

Patching and Resolution of the Vulnerabilities

To mitigate the vulnerabilities, WatchGuard and Panda Security have promptly released patched versions. The updates are available as WatchGuard EPDR and Panda AD360 version 8.00.22.0023, designed to address the identified issues and enhance the overall security of these products.

Additionally, users of Panda Dome for Windows should ensure that they have updated to version 22.02.01. This release incorporates the necessary patches to safeguard against these vulnerabilities, further securing the users’ systems.

In addition to resolving the reported vulnerabilities, the released patches also address an arbitrary kernel memory read flaw in the pskmad_64.sys driver. If exploited, this flaw could allow an attacker to read arbitrary kernel memory, potentially revealing sensitive information.

Information on Accessing More Details and Patches

For more detailed information on the vulnerabilities and the patches provided, users are encouraged to visit WatchGuard’s security advisories page. Here, they can find specific instructions on applying the necessary updates and recommended security measures to ensure system protection.

The discovery of critical vulnerabilities within WatchGuard and Panda Security products highlights the ongoing challenges organizations face in maintaining robust security systems. Prompt action from both companies in releasing patched versions signifies their commitment to addressing these vulnerabilities and ensuring user safety. Organizations and individuals who utilize these products should immediately update to the latest patched versions to safeguard themselves from potential exploitation and maintain a secure operating environment.

Explore more

Agentic AI Growth Systems – Review

The persistent failure of traditional marketing automation to address fragmented consumer behavior has finally reached a breaking point, necessitating a fundamental departure from rigid logic toward autonomous intelligence. For decades, the marketing technology sector operated on the assumption that a customer journey could be mapped and controlled through a series of “if-then” sequences. However, the sheer volume of digital touchpoints

Support Employee Wellbeing by Simplifying Wellness Initiatives

The modern professional landscape is currently saturated with a dizzying array of wellness programs that often leave employees feeling more exhausted than rejuvenated by the sheer volume of choices. Many organizations have traditionally operated under the assumption that more is better, offering everything from mindfulness apps and yoga sessions to complex nutritional workshops and competitive step challenges. However, the sheer

Baby Boomers vs. Gen Z: A Comparative Analysis

The modern office is no longer a monolith of shared experiences; instead, it has become a complex ecosystem where individuals born during the post-war era collaborate daily with digital natives who have never known a world without high-speed internet. This unprecedented age diversity is the defining characteristic of the current labor market, which now features four distinct generations working side-by-side.

Workplace AI Integration – Review

Corporate executives across the globe are no longer questioning whether artificial intelligence belongs in the office but are instead scrambling to master its integration before their competitors render them obsolete. This technological shift represents more than just a software upgrade; it is a fundamental restructuring of how business logic is executed across departments. Workplace AI has transitioned from a series

Is Your CRM a System of Record or a System of Execution?

The enterprise software landscape is currently undergoing a radical transformation as businesses abandon static databases in favor of intelligent engines that can actually finish the work they track. ServiceNow Autonomous CRM serves as a primary catalyst for this change, positioning itself not merely as a repository for customer information but as an active participant in operational workflows. By integrating agentic