Описание
In certain Goverlan products, the Windows Firewall is temporarily turned off upon a Goverlan agent update operation. This allows remote attackers to bypass firewall blocking rules for a time period of up to 30 seconds. This affects Goverlan Reach Console before 10.5.1, Reach Server before 3.70.1, and Reach Client Agents before 10.1.11.
Ссылки
- Vendor Advisory
- ExploitVendor Advisory
- Vendor Advisory
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 10.1.11 (исключая)Версия до 10.5.1 (исключая)Версия до 3.70.1 (исключая)
Одно из
cpe:2.3:a:goverlan:client_agent:*:*:*:*:*:*:*:*
cpe:2.3:a:goverlan:reach_console:*:*:*:*:*:*:*:*
cpe:2.3:a:goverlan:reach_server:*:*:*:*:*:*:*:*
EPSS
Процентиль: 55%
0.00328
Низкий
6.5 Medium
CVSS3
3.5 Low
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
CVSS3: 6.5
github
больше 3 лет назад
In certain Goverlan products, the Windows Firewall is temporarily turned off upon a Goverlan agent update operation. This allows remote attackers to bypass firewall blocking rules for a time period of up to 30 seconds. This affects Goverlan Reach Console before 10.5.1, Reach Server before 3.70.1, and Reach Client Agents before 10.1.11.
EPSS
Процентиль: 55%
0.00328
Низкий
6.5 Medium
CVSS3
3.5 Low
CVSS2
Дефекты
NVD-CWE-Other