Critical Vulnerabilities Discovered in WatchGuard and Panda Security Products; Patched Versions Released

In a concerning development, security researchers have recently uncovered critical vulnerabilities in WatchGuard and Panda Security products. These vulnerabilities could potentially allow attackers to cause denial of service (DoS) conditions or execute arbitrary code with system privileges. The vulnerabilities specifically affect the Panda Kernel Memory Access driver (pskmad_64.sys), which is installed alongside WatchGuard EPDR, Panda AD360, and Panda Dome for Windows. In response to these findings, the companies have promptly released patched versions to address the vulnerabilities.

Vulnerabilities in WatchGuard and Panda Security Products

The vulnerable products include WatchGuard EDR, Panda AD360, and Panda Dome for Windows. These products are commonly used by organizations for endpoint protection and security management.

The vulnerabilities arise from issues within the Panda Kernel Memory Access driver (pskmad_64.sys), which is responsible for handling kernel-level memory operations. This driver, when compromised, could lead to serious security breaches and compromise the overall system integrity.

Vulnerability 1: CVE-2023-6330 – Memory Pool Overflow Defect

The first vulnerability, identified as CVE-2023-6330, is characterized as a memory pool overflow defect. If exploited, it allows an attacker to overflow the allocated kernel memory pool.

The driver fails to adequately validate the contents of specific registry values related to the operating system (OS) version. This oversight enables an attacker to inject maliciously crafted content into the registry, ultimately leading to the overflow of kernel memory.

Exploiting this vulnerability could result in the execution of arbitrary code with system privileges. However, it is important to note that successful exploitation of this vulnerability requires authentication with administrative privileges.

Vulnerability 2: CVE-2023-6331 – Out-of-Bounds Write Issue

The second vulnerability, identified as CVE-2023-6331, is an out-of-bounds write issue that also results in a kernel memory overflow.

An attacker can exploit this vulnerability by sending a specifically crafted packet via an I/O Request Packet (IRP) request with a particular IOCTL code. This action potentially leads to an overflow in the non-paged memory area, resulting in compromised system security.

Similar to the first vulnerability, successful exploitation of CVE-2023-6331 could result in arbitrary code execution with system privileges. However, authentication with administrative privileges is still necessary for the attacker to carry out the exploit.

Authentication Requirements for Exploiting the Vulnerabilities

To successfully exploit both vulnerabilities, an attacker must possess administrative privileges. This requirement acts as a protective measure, making it challenging for malicious actors to leverage the vulnerabilities without already having elevated access rights.

The need for administrative privileges adds an extra layer of protection, particularly in environments where proper access control and user privilege management are enforced. Organizations that strictly adhere to user privilege segregation can potentially mitigate the risks associated with these vulnerabilities.

Patching and Resolution of the Vulnerabilities

To mitigate the vulnerabilities, WatchGuard and Panda Security have promptly released patched versions. The updates are available as WatchGuard EPDR and Panda AD360 version 8.00.22.0023, designed to address the identified issues and enhance the overall security of these products.

Additionally, users of Panda Dome for Windows should ensure that they have updated to version 22.02.01. This release incorporates the necessary patches to safeguard against these vulnerabilities, further securing the users’ systems.

In addition to resolving the reported vulnerabilities, the released patches also address an arbitrary kernel memory read flaw in the pskmad_64.sys driver. If exploited, this flaw could allow an attacker to read arbitrary kernel memory, potentially revealing sensitive information.

Information on Accessing More Details and Patches

For more detailed information on the vulnerabilities and the patches provided, users are encouraged to visit WatchGuard’s security advisories page. Here, they can find specific instructions on applying the necessary updates and recommended security measures to ensure system protection.

The discovery of critical vulnerabilities within WatchGuard and Panda Security products highlights the ongoing challenges organizations face in maintaining robust security systems. Prompt action from both companies in releasing patched versions signifies their commitment to addressing these vulnerabilities and ensuring user safety. Organizations and individuals who utilize these products should immediately update to the latest patched versions to safeguard themselves from potential exploitation and maintain a secure operating environment.

Explore more

Email Marketing Drives Ecommerce Growth and Loyalty

In an era dominated by social media and ever-evolving digital platforms, email marketing has carved its niche as a cornerstone strategy for ecommerce brands seeking growth and customer loyalty. While flashy apps and websites pop up with regularity, emails quietly continue to offer consistent, adaptable solutions for engaging audiences effectively. A cornerstone statistic from the Data & Marketing Association has

Will Validity’s Acquisition Revolutionize Email Marketing?

In a strategic move, Validity has successfully acquired Litmus to revolutionize the email marketing landscape by integrating Litmus’s advanced email optimization and testing capabilities into Validity’s robust platform. Validity, renowned for its expertise in managing CRM data and email verification, aims to construct a comprehensive system that oversees every phase of the email campaign lifecycle. With products such as DemandTools

Can You Stay Ahead in Digital Marketing Innovation?

In the rapidly evolving world of digital marketing, staying ahead of innovation poses a formidable challenge for industry professionals. As technology advances, new tools, strategies, and platforms emerge at a breakneck pace, leaving marketers in constant pursuit of the latest trends. The upcoming digital marketing conference highlights the importance of embracing these technological shifts, urging senior marketing leaders to gather

Can Sender Revolutionize Email Marketing for Small Businesses?

The rapidly evolving landscape of digital marketing presents both opportunities and challenges for small businesses striving to establish their presence amid fierce competition. Email marketing has long been an essential tool in this realm, but the prohibitive costs and complex features of many platforms have frequently hampered access for smaller entities. Against this backdrop, Sender emerges as a compelling alternative—a

Can HPE Eclipse VMware in the Private Cloud Race?

The private cloud market has long been a competitive realm filled with robust technologies and innovative solutions. Among the major players, Hewlett Packard Enterprise (HPE) and VMware stand out for their ongoing rivalry in providing cloud management solutions. The market has witnessed significant shifts, particularly after Broadcom’s operational changes within VMware, prompting several tech giants to position themselves as feasible