


This vulnerability only affects authentication of network users in intercepted traffic. This may allow the attacker to bypass user authentication security controls in ASG and ProxySG. A remote attacker can modify a valid SAML response without invalidating its cryptographic signature. When parsing SAML responses, ASG and ProxySG incorrectly handle XML nodes with comments. The products can be configured with a SAML authentication realm to authenticate network users in intercepted proxy traffic. Symantec Advanced Secure Gateway (ASG) 6.6 and 6.7, and ProxySG 6.5, 6.6, and 6.7 are susceptible to a SAML authentication bypass vulnerability. The vulnerability causes an out-of-bounds write, which leads to remote denial of service or possibly code execution. WAGO IO 750-849 01.01.27 and 01.02.05, WAGO IO 750-881, and WAGO IO 758-870 have weak credential management.Ī global buffer overflow was discovered in the iteration_loop function in loop.c in BladeEnc version 0.94.2. The page that allows this has been confirmed in firmware as old as 2006. You can use this page as a web shell essentially to execute commands, though you get no feedback client-side from the web application: if the command is valid, it executes. The HTTP web-management application on Edgewater Networks Edgemarc appliances has a hidden page that allows for user-defined commands such as specific iptables routes, etc., to be set.
