Vulnerabilities found in WatchGuard and Panda Security products posed significant security risks, allowing potential attackers to initiate denial-of-service (DoS) conditions or execute arbitrary code with System privileges. The security flaws were specifically identified in the Panda Kernel Memory Access driver (pskmad_64.sys), a component installed alongside WatchGuard EPDR, Panda AD360, and Panda Dome for Windows. One of the vulnerabilities, CVE-2023-6330, involved a memory pool overflow defect, enabling attackers to overflow the allocated kernel memory pool. While the minimum impact could result in a denial of service, chaining CVE-2023-6330 with other vulnerabilities might lead to remote code execution.
Another security flaw, CVE-2023-6331, was identified as an out-of-bounds write issue causing a kernel memory overflow. This vulnerability could be exploited by sending a maliciously crafted packet via an IRP request with a specific IOCTL code, potentially leading to an overflow in a non-paged memory area. Both CVE-2023-6330 and CVE-2023-6331, while having the potential for code execution, require attackers to be authenticated with administrative privileges to exploit them successfully. The vulnerabilities were addressed with the release of WatchGuard EPDR and Panda AD360 version 8.00.22.0023, as well as Panda Dome version 22.02.01. Additionally, the updates addressed an arbitrary kernel memory read flaw in the pskmad_64.sys driver, preventing attackers from reading arbitrary kernel memory.
Sophos, the cybersecurity firm that identified these vulnerabilities, highlighted the importance of these patches in mitigating potential threats. The company emphasized that these flaws could have serious consequences, but the impact is lessened due to the authentication requirement with administrative privileges. The updates provided by WatchGuard and Panda Security aim to enhance the security of their products, reducing the risk of exploitation and potential harm caused by attackers. Users are encouraged to apply these updates promptly to ensure the protection of their systems against potential security threats.