CVE-2018-18371

Severity CVSS v4.0:
Pending analysis
Type:
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
Publication date:
30/08/2019
Last modified:
08/07/2021

Description

The ASG/ProxySG FTP proxy WebFTP mode allows intercepting FTP connections where a user accesses an FTP server via a ftp:// URL in a web browser. An information disclosure vulnerability in the WebFTP mode allows a malicious user to obtain plaintext authentication credentials for a remote FTP server from the ASG/ProxySG's web listing of the FTP server. Affected versions: ASG 6.6 and 6.7 prior to 6.7.4.2; ProxySG 6.5 prior to 6.5.10.15, 6.6, and 6.7 prior to 6.7.4.2.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:broadcom:advanced_secure_gateway:*:*:*:*:*:*:*:* 6.7 (including) 6.7.4.2 (excluding)
cpe:2.3:a:broadcom:advanced_secure_gateway:6.6:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:symantec_proxysg:*:*:*:*:*:*:*:* 6.5 (including) 6.5.10.15 (excluding)
cpe:2.3:a:broadcom:symantec_proxysg:*:*:*:*:*:*:*:* 6.7 (including) 6.7.4.2 (excluding)
cpe:2.3:a:broadcom:symantec_proxysg:6.6:*:*:*:*:*:*:*


References to Advisories, Solutions, and Tools