Critical Vulnerabilities Discovered in WatchGuard and Panda Security Products; Patched Versions Released

In a concerning development, security researchers have recently uncovered critical vulnerabilities in WatchGuard and Panda Security products. These vulnerabilities could potentially allow attackers to cause denial of service (DoS) conditions or execute arbitrary code with system privileges. The vulnerabilities specifically affect the Panda Kernel Memory Access driver (pskmad_64.sys), which is installed alongside WatchGuard EPDR, Panda AD360, and Panda Dome for Windows. In response to these findings, the companies have promptly released patched versions to address the vulnerabilities.

Vulnerabilities in WatchGuard and Panda Security Products

The vulnerable products include WatchGuard EDR, Panda AD360, and Panda Dome for Windows. These products are commonly used by organizations for endpoint protection and security management.

The vulnerabilities arise from issues within the Panda Kernel Memory Access driver (pskmad_64.sys), which is responsible for handling kernel-level memory operations. This driver, when compromised, could lead to serious security breaches and compromise the overall system integrity.

Vulnerability 1: CVE-2023-6330 – Memory Pool Overflow Defect

The first vulnerability, identified as CVE-2023-6330, is characterized as a memory pool overflow defect. If exploited, it allows an attacker to overflow the allocated kernel memory pool.

The driver fails to adequately validate the contents of specific registry values related to the operating system (OS) version. This oversight enables an attacker to inject maliciously crafted content into the registry, ultimately leading to the overflow of kernel memory.

Exploiting this vulnerability could result in the execution of arbitrary code with system privileges. However, it is important to note that successful exploitation of this vulnerability requires authentication with administrative privileges.

Vulnerability 2: CVE-2023-6331 – Out-of-Bounds Write Issue

The second vulnerability, identified as CVE-2023-6331, is an out-of-bounds write issue that also results in a kernel memory overflow.

An attacker can exploit this vulnerability by sending a specifically crafted packet via an I/O Request Packet (IRP) request with a particular IOCTL code. This action potentially leads to an overflow in the non-paged memory area, resulting in compromised system security.

Similar to the first vulnerability, successful exploitation of CVE-2023-6331 could result in arbitrary code execution with system privileges. However, authentication with administrative privileges is still necessary for the attacker to carry out the exploit.

Authentication Requirements for Exploiting the Vulnerabilities

To successfully exploit both vulnerabilities, an attacker must possess administrative privileges. This requirement acts as a protective measure, making it challenging for malicious actors to leverage the vulnerabilities without already having elevated access rights.

The need for administrative privileges adds an extra layer of protection, particularly in environments where proper access control and user privilege management are enforced. Organizations that strictly adhere to user privilege segregation can potentially mitigate the risks associated with these vulnerabilities.

Patching and Resolution of the Vulnerabilities

To mitigate the vulnerabilities, WatchGuard and Panda Security have promptly released patched versions. The updates are available as WatchGuard EPDR and Panda AD360 version 8.00.22.0023, designed to address the identified issues and enhance the overall security of these products.

Additionally, users of Panda Dome for Windows should ensure that they have updated to version 22.02.01. This release incorporates the necessary patches to safeguard against these vulnerabilities, further securing the users’ systems.

In addition to resolving the reported vulnerabilities, the released patches also address an arbitrary kernel memory read flaw in the pskmad_64.sys driver. If exploited, this flaw could allow an attacker to read arbitrary kernel memory, potentially revealing sensitive information.

Information on Accessing More Details and Patches

For more detailed information on the vulnerabilities and the patches provided, users are encouraged to visit WatchGuard’s security advisories page. Here, they can find specific instructions on applying the necessary updates and recommended security measures to ensure system protection.

The discovery of critical vulnerabilities within WatchGuard and Panda Security products highlights the ongoing challenges organizations face in maintaining robust security systems. Prompt action from both companies in releasing patched versions signifies their commitment to addressing these vulnerabilities and ensuring user safety. Organizations and individuals who utilize these products should immediately update to the latest patched versions to safeguard themselves from potential exploitation and maintain a secure operating environment.

Explore more

Is Recruiting Support Staff Harder Than Hiring Teachers?

The traditional image of a school crisis usually centers on a shortage of teachers, yet a much quieter and potentially more damaging vacancy is hollowing out the English education system. While headlines frequently focus on those leading the classrooms, the invisible backbone of the school—the teaching assistants and technical support staff—is disappearing at an alarming rate. This shift has created

How Can HR Successfully Move to a Skills-Based Model?

The traditional corporate hierarchy, once anchored by rigid job descriptions and static titles, is rapidly dissolving into a more fluid ecosystem centered on individual competencies. As generative AI continues to redefine the boundaries of human productivity in 2026, organizations are discovering that the “job” as a unit of work is often too slow to adapt to fluctuating market demands. This

How Is Kazakhstan Shaping the Future of Financial AI?

While many global financial centers are entangled in the restrictive complexities of preventative legislation, Kazakhstan has quietly transformed into a high-velocity laboratory for artificial intelligence integration within the banking sector. This Central Asian nation is currently redefining the intersection of sovereign technology and fiscal oversight by prioritizing infrastructural depth over rigid, preemptive regulation. By fostering a climate of “technological neutrality,”

The Future of Data Entry: Integrating AI, RPA, and Human Insight

Organizations failing to recognize the fundamental shift from clerical data entry to intelligent information synthesis risk a complete loss of operational competitiveness in a global market that no longer rewards manual speed. The landscape of data management is undergoing a profound transformation, moving away from the stagnant, labor-intensive practices of the past toward a dynamic, technology-driven ecosystem. Historically, data entry

Getsitecontrol Debuts Free Tools to Boost Email Performance

Digital marketers often face a frustrating paradox where the most visually stunning campaign assets are the very things that cause an email to vanish into a spam folder or fail to load on a mobile device. The introduction of Getsitecontrol’s new suite marks a significant pivot toward accessible, high-performance marketing utilities. By offering browser-based solutions for file optimization, the platform