CVE-2016-7089

Published on: 08/24/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:07 PM UTC

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Certain versions of Rapidstream from Watchguard contain the following vulnerability:

WatchGuard RapidStream appliances allow local users to gain privileges and execute arbitrary commands via a crafted ifconfig command, aka ESCALATEPLOWMAN.

  • CVE-2016-7089 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.2 - HIGH

Access
Vector
Access
Complexity
Authentication
LOCAL LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
NSA Equation Group Exploit Leak, What Does It Mean to You? | Secplicity - Security Simplified Third Party Advisory
www.secplicity.org
text/html
URL Logo MISC www.secplicity.org/2016/08/16/nsa-equation-group-exploit-leak-mean/
Watchguard Firewalls - 'ESCALATEPLOWMAN' ifconfig Privilege Escalation Exploit
Third Party Advisory
VDB Entry
www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 40270
ESCALATEPLOWMAN WatchGuard Privilege Escalation ≈ Packet Storm Exploit
Third Party Advisory
VDB Entry
packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/138393/ESCALATEPLOWMAN-WatchGuard-Privilege-Escalation.html
WatchGuard Rapidstream CVE-2016-7089 Local Privilege Escalation Vulnerability cve.report (archive)
text/html
URL Logo BID 92638

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationWatchguardRapidstream-AllAllAll
ApplicationWatchguardRapidstream-AllAllAll
  • cpe:2.3:a:watchguard:rapidstream:-:*:*:*:*:*:*:*:
  • cpe:2.3:a:watchguard:rapidstream:-:*:*:*:*:*:*:*: