Symantec.Web.Gateway.Remote.LFI.Root.Exploit

description-logoDescription

This indicates an attack attempt against an arbitrary Code Execution and an Information Disclosure vulnerability in Symantec Web Gateway.
The vulnerabilities are caused by an error when the vulnerable software handles a malicious request URI. It allows a remote attacker to execute arbitrary code or disclose information via sending a crafted URI.

affected-products-logoAffected Products

Symantec Web Gateway 5.0.1
Symantec Web Gateway 5.0

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.
Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.

recomended-action-logoRecommended Actions

Best Practices
As part of normal best practices, Symantec strongly recommends:
+ Restrict access to administration or management systems to privileged users.
+ Disable remote access or restrict it to trusted/authorized systems only.
+ Keep all operating systems and applications updated with the latest vendor patches.
+ Follow a multi-layered approach to security. Run both firewall and anti-malware applications, at a minimum, to provide multiple points of detection and protection to both inbound and outbound threats.
+ Deploy network and host-based intrusion detection systems to monitor network traffic for signs of anomalous or suspicious activity. This may aid in detection of attacks or malicious activity related to exploitation of latent vulnerabilities.
Apply the most recent upgrades or patches from the vendor.
http://www.symantec.com/business/web-gateway

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2022-01-04 19.233 Sig Added
2021-09-27 18.165 Sig Added