Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Latest SSL VPN vulnerability doesn't affect WatchGuard XTM

WatchGuard Technologies : 09 December, 2009  (New Product)
XTM firewall appliances from WatchGuard Technologies are immune to the recent SSL VPN vulnerability discovered by the US Government
WatchGuard Technologies has confirmed that the SSL VPN technology used in its multifunction XTM (eXensible Threat Management) firewall appliances are immune from the recently discovered SSL VPN vulnerability that affects Cisco, Juniper and SonicWall.

The vulnerability, which is in essence a session hijack type of attack, is documented by the US-CERT (United States Computer Emergency Readiness Team). By convincing a user to view a specially crafted web page, a remote attacker may be able to obtain VPN session tokens and read or modify content (including cookies, script, or HTML content) from any site accessed through the clientless SSL VPN. Noted by US-CERT is the fact that this vulnerability can be used "to bypass authentication or conduct other Web-based attacks."

Currently, there is no known fix. This makes it a worldwide critical issue because of the fact that so many remote and mobile workers use VPN connections to access internal servers for mail, file-share drives, collaboration tools and other critical applications and files.

However, all WatchGuard multifunction XTM appliances provide highly secure SSL VPN functionality and are not affected by this particular SSL problem as described by US-CERT. "As mobile workers rely on SSL VPN technology to securely connect to their remote offices or corporate networks, they need reliable connectivity solutions that are free from hackers," said Eric Aarrestad, VP of Marketing at WatchGuard Technologies. "Unlike customers who rely on networking vendors to provide network security, WatchGuard customers can rest assured knowing that their remote and mobile employees can safely and securely connect to mission critical networks, applications and data without exposing their business to undue risks."

The vulnerability highlighted by the US-CERT applies to SSL products that use the SSL URL rewriting technique - sometimes called URL Mangling - as a means of accessing web-based trusted resources directly from a browser. However, WatchGuard XTM appliances with SSL VPNs use an 'access client', which is essentially a piece of software running on an end-user's system that build tunnels very much the same way any IPSec VPN products do. This mechanism is not subject to this vulnerability.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo