CVE-2021-30648
📋 TL;DR
CVE-2021-30648 is an authentication bypass vulnerability in Symantec Advanced Secure Gateway (ASG) and ProxySG web management consoles. Unauthenticated attackers can execute arbitrary CLI commands, modify configurations, and restart appliances. Organizations using affected versions of these products are at risk.
💻 Affected Systems
- Symantec Advanced Secure Gateway (ASG)
- Symantec ProxySG
📦 What is this software?
Symantec Advanced Secure Gateway 500 10 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway 500 10 Firmware →
Symantec Advanced Secure Gateway 500 10 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway 500 10 Firmware →
Symantec Advanced Secure Gateway 500 10 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway 500 10 Firmware →
Symantec Advanced Secure Gateway 500 10 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway 500 10 Firmware →
Symantec Advanced Secure Gateway S200 30 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S200 30 Firmware →
Symantec Advanced Secure Gateway S200 30 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S200 30 Firmware →
Symantec Advanced Secure Gateway S200 30 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S200 30 Firmware →
Symantec Advanced Secure Gateway S200 30 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S200 30 Firmware →
Symantec Advanced Secure Gateway S200 40 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S200 40 Firmware →
Symantec Advanced Secure Gateway S200 40 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S200 40 Firmware →
Symantec Advanced Secure Gateway S200 40 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S200 40 Firmware →
Symantec Advanced Secure Gateway S200 40 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S200 40 Firmware →
Symantec Advanced Secure Gateway S400 20 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S400 20 Firmware →
Symantec Advanced Secure Gateway S400 20 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S400 20 Firmware →
Symantec Advanced Secure Gateway S400 20 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S400 20 Firmware →
Symantec Advanced Secure Gateway S400 20 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S400 20 Firmware →
Symantec Advanced Secure Gateway S400 30 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S400 30 Firmware →
Symantec Advanced Secure Gateway S400 30 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S400 30 Firmware →
Symantec Advanced Secure Gateway S400 30 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S400 30 Firmware →
Symantec Advanced Secure Gateway S400 30 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S400 30 Firmware →
Symantec Advanced Secure Gateway S400 40 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S400 40 Firmware →
Symantec Advanced Secure Gateway S400 40 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S400 40 Firmware →
Symantec Advanced Secure Gateway S400 40 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S400 40 Firmware →
Symantec Advanced Secure Gateway S400 40 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S400 40 Firmware →
Symantec Advanced Secure Gateway S500 20 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S500 20 Firmware →
Symantec Advanced Secure Gateway S500 20 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S500 20 Firmware →
Symantec Advanced Secure Gateway S500 20 Firmware by Broadcom
View all CVEs affecting Symantec Advanced Secure Gateway S500 20 Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the security gateway allowing attackers to intercept all traffic, install persistent backdoors, disable security policies, and use the appliance as a pivot point into the internal network.
Likely Case
Attackers modify security policies to bypass filtering, exfiltrate sensitive configuration data, or cause service disruption by restarting appliances.
If Mitigated
Limited impact if management interfaces are properly segmented and access-controlled, though the vulnerability still exists in the software.
🎯 Exploit Status
Exploitation requires network access to the management interface but no authentication. Public exploit code exists.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: ASG 6.7.4.1 and later, ProxySG 6.7.4.2 and later
Vendor Advisory: https://support.broadcom.com/security-advisory/content/security-advisories/0/SYMSA18331
Restart Required: Yes
Instructions:
1. Download the appropriate patch from Broadcom support portal. 2. Apply patch via management console or CLI. 3. Restart the appliance as required. 4. Verify the patch was successfully applied.
🔧 Temporary Workarounds
Network Segmentation
allRestrict access to management interfaces to trusted administrative networks only
Configure firewall rules to block external access to management ports (default: 8082, 8443)
Access Control Lists
allImplement IP-based access controls on management interfaces
Use appliance ACLs to restrict management console access to specific source IPs
🧯 If You Can't Patch
- Immediately restrict network access to management interfaces using firewall rules
- Implement multi-factor authentication for administrative access and monitor for unauthorized configuration changes
🔍 How to Verify
Check if Vulnerable:
Check appliance version via CLI: 'show version' or via web console. If version is ASG/ProxySG 6.7 or earlier, the system is vulnerable.
Check Version:
show version
Verify Fix Applied:
Verify version is ASG 6.7.4.1+ or ProxySG 6.7.4.2+ using 'show version' command. Test authentication requirements on management interface.
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated access to /admin/ endpoints
- CLI commands executed from unauthenticated sessions
- Configuration changes from unknown IP addresses
Network Indicators:
- Unusual traffic patterns to management ports (8082, 8443) from external sources
- Multiple failed authentication attempts followed by successful access
SIEM Query:
source_ip NOT IN (admin_networks) AND destination_port IN (8082, 8443) AND http_status=200