pfSense < 2.3.1 Multiple Vulnerabilities (SA-16_03 / SA-16-04)

high Nessus Plugin ID 106500

Synopsis

The remote firewall host is affected by multiple vulnerabilities.

Description

According to its self-reported version number, the remote pfSense install is prior to 2.3.1. It is, therefore, affected by multiple vulnerabilities.

Solution

Upgrade to pfSense version 2.3.1 or later.

See Also

https://doc.pfsense.org/index.php/2.3.1_New_Features_and_Changes

http://www.nessus.org/u?434aa389

http://www.nessus.org/u?f5d9b668

Plugin Details

Severity: High

ID: 106500

File Name: pfsense_SA-16_04.nasl

Version: 1.11

Type: remote

Family: Firewalls

Published: 1/31/2018

Updated: 4/27/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2016-2109

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.2

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:pfsense:pfsense, cpe:/a:bsdperimeter:pfsense

Required KB Items: Host/pfSense

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/9/2016

Vulnerability Publication Date: 5/9/2016

Exploitable With

Core Impact

Reference Information

CVE: CVE-2016-1886, CVE-2016-1887, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2109, CVE-2016-2176

BID: 87940, 89744, 89746, 89757, 89760, 90734

FreeBSD: SA-16:17.openssl, SA-16:18.atkbd, SA-16:19.sendmsg