Critical Vulnerabilities Discovered in WatchGuard and Panda Security Products; Patched Versions Released

In a concerning development, security researchers have recently uncovered critical vulnerabilities in WatchGuard and Panda Security products. These vulnerabilities could potentially allow attackers to cause denial of service (DoS) conditions or execute arbitrary code with system privileges. The vulnerabilities specifically affect the Panda Kernel Memory Access driver (pskmad_64.sys), which is installed alongside WatchGuard EPDR, Panda AD360, and Panda Dome for Windows. In response to these findings, the companies have promptly released patched versions to address the vulnerabilities.

Vulnerabilities in WatchGuard and Panda Security Products

The vulnerable products include WatchGuard EDR, Panda AD360, and Panda Dome for Windows. These products are commonly used by organizations for endpoint protection and security management.

The vulnerabilities arise from issues within the Panda Kernel Memory Access driver (pskmad_64.sys), which is responsible for handling kernel-level memory operations. This driver, when compromised, could lead to serious security breaches and compromise the overall system integrity.

Vulnerability 1: CVE-2023-6330 – Memory Pool Overflow Defect

The first vulnerability, identified as CVE-2023-6330, is characterized as a memory pool overflow defect. If exploited, it allows an attacker to overflow the allocated kernel memory pool.

The driver fails to adequately validate the contents of specific registry values related to the operating system (OS) version. This oversight enables an attacker to inject maliciously crafted content into the registry, ultimately leading to the overflow of kernel memory.

Exploiting this vulnerability could result in the execution of arbitrary code with system privileges. However, it is important to note that successful exploitation of this vulnerability requires authentication with administrative privileges.

Vulnerability 2: CVE-2023-6331 – Out-of-Bounds Write Issue

The second vulnerability, identified as CVE-2023-6331, is an out-of-bounds write issue that also results in a kernel memory overflow.

An attacker can exploit this vulnerability by sending a specifically crafted packet via an I/O Request Packet (IRP) request with a particular IOCTL code. This action potentially leads to an overflow in the non-paged memory area, resulting in compromised system security.

Similar to the first vulnerability, successful exploitation of CVE-2023-6331 could result in arbitrary code execution with system privileges. However, authentication with administrative privileges is still necessary for the attacker to carry out the exploit.

Authentication Requirements for Exploiting the Vulnerabilities

To successfully exploit both vulnerabilities, an attacker must possess administrative privileges. This requirement acts as a protective measure, making it challenging for malicious actors to leverage the vulnerabilities without already having elevated access rights.

The need for administrative privileges adds an extra layer of protection, particularly in environments where proper access control and user privilege management are enforced. Organizations that strictly adhere to user privilege segregation can potentially mitigate the risks associated with these vulnerabilities.

Patching and Resolution of the Vulnerabilities

To mitigate the vulnerabilities, WatchGuard and Panda Security have promptly released patched versions. The updates are available as WatchGuard EPDR and Panda AD360 version 8.00.22.0023, designed to address the identified issues and enhance the overall security of these products.

Additionally, users of Panda Dome for Windows should ensure that they have updated to version 22.02.01. This release incorporates the necessary patches to safeguard against these vulnerabilities, further securing the users’ systems.

In addition to resolving the reported vulnerabilities, the released patches also address an arbitrary kernel memory read flaw in the pskmad_64.sys driver. If exploited, this flaw could allow an attacker to read arbitrary kernel memory, potentially revealing sensitive information.

Information on Accessing More Details and Patches

For more detailed information on the vulnerabilities and the patches provided, users are encouraged to visit WatchGuard’s security advisories page. Here, they can find specific instructions on applying the necessary updates and recommended security measures to ensure system protection.

The discovery of critical vulnerabilities within WatchGuard and Panda Security products highlights the ongoing challenges organizations face in maintaining robust security systems. Prompt action from both companies in releasing patched versions signifies their commitment to addressing these vulnerabilities and ensuring user safety. Organizations and individuals who utilize these products should immediately update to the latest patched versions to safeguard themselves from potential exploitation and maintain a secure operating environment.

Explore more

Can a New $1 Billion Organization Save Ethereum?

The global decentralized finance landscape has reached a point of maturity where the original governance structures of early blockchain pioneers are facing unprecedented scrutiny from their own founders and contributors. As we move through 2026, the Ethereum ecosystem finds itself navigating a period of significant internal friction, sparked by a radical proposal to establish a new, independent organization dedicated to

Is Cybersecurity Now a Matter of Life and Death in Healthcare?

The reliance of modern medicine on digital ecosystems has reached a threshold where the integrity of a network is now as vital to patient survival as the functionality of a ventilator or a defibrillator. For decades, hospital cybersecurity was treated as a secondary administrative function, largely focused on protecting patient records from identity theft or ensuring billing systems remained operational.

Will RPA Reach $36 Billion by 2032 Through AI Integration?

The global landscape of enterprise operations has reached a critical juncture where the integration of advanced software robotics is no longer a luxury but a fundamental requirement for survival. As of 2026, Robotic Process Automation has transitioned from its origins as a niche utility for clerical task reduction into a sophisticated architectural pillar for digital-first organizations. This shift is primarily

Former Worker Sentenced for Revenge Cyberattack on Co-op

The modern supply chain is a fragile ecosystem where a single point of digital failure can result in empty supermarket shelves and millions in lost revenue within hours. This vulnerability was starkly demonstrated when Lewis Nash, a former employee at the Co-op’s Lea Green distribution center in St. Helens, launched a calculated cyberattack against his former employer following a dispute

FBI and Europol Shut Down VPN Used by Ransomware Gangs

The sudden collapse of a major digital safe haven has sent shockwaves through the global cybercrime community after an international coalition spearheaded by the FBI and Europol dismantled a specialized network. Known as First VPN, this service functioned as the primary backbone for at least twenty-five prominent ransomware syndicates, providing them with the necessary tools to conduct large-scale botnet management