CVE-2021-46825

9.1 CRITICAL

📋 TL;DR

This HTTP desync vulnerability in Symantec ASG and ProxySG allows remote unauthenticated attackers to send crafted HTTP requests through the proxy, causing web server responses to be forwarded to unintended clients. This affects all organizations using vulnerable versions of these proxy products, potentially exposing sensitive data from other users.

💻 Affected Systems

Products:
  • Symantec Advanced Secure Gateway (ASG)
  • Symantec ProxySG
Versions: Specific versions not provided in CVE description; consult vendor advisory for exact affected versions
Operating Systems: All supported OS for these products
Default Config Vulnerable: ⚠️ Yes
Notes: Affects standard proxy configurations where the products handle HTTP traffic between clients and web servers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could intercept sensitive data (authentication tokens, session cookies, personal information) from other users' web sessions, leading to account compromise and data breaches.

🟠

Likely Case

Information disclosure where attackers can view other users' web traffic through the proxy, potentially capturing login credentials or sensitive data.

🟢

If Mitigated

Limited impact if proper network segmentation and monitoring are in place to detect anomalous HTTP traffic patterns.

🌐 Internet-Facing: HIGH - The vulnerability affects proxy servers that handle internet traffic, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal proxies could still be exploited if attackers gain internal network access or through compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires attacker to be able to send HTTP requests through the vulnerable proxy and coordinate with other web clients communicating with the same backend server.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Consult Broadcom/Symantec security advisory for specific fixed versions

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/20638

Restart Required: Yes

Instructions:

1. Review Broadcom Security Advisory 2. Download and apply the latest security update for your ASG/ProxySG version 3. Restart the proxy service 4. Verify the update was successful

🔧 Temporary Workarounds

Temporary HTTP request filtering

all

Configure the proxy to block or sanitize malformed HTTP requests that could trigger the desync condition

Consult product documentation for HTTP request filtering rules

🧯 If You Can't Patch

  • Implement network segmentation to isolate proxy servers from untrusted networks
  • Enable detailed HTTP traffic logging and monitoring for anomalous request patterns

🔍 How to Verify

Check if Vulnerable:

Check your ASG/ProxySG version against the affected versions listed in the Broadcom security advisory

Check Version:

Consult product documentation for version check commands (typically via management interface or CLI)

Verify Fix Applied:

Verify the installed version matches or exceeds the patched version specified in the advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP request patterns
  • Multiple HTTP requests with malformed headers from single sources
  • Unexpected response forwarding between different client sessions

Network Indicators:

  • HTTP traffic with inconsistent request/response pairing
  • Abnormal proxy behavior where responses go to wrong clients

SIEM Query:

Search for HTTP requests with unusual header patterns or desync indicators in proxy logs

🔗 References

📤 Share & Export