Proxy administrators would like to determine if Edge SWG (formerly ProxySG) devices are vulnerable to CVE-2023-48795.
Edge SWG (formerly ProxySG)
Vulnerability Details
Advisory Link(s)
For impacted Edge SWG (formerly ProxySG) devices, you can manually disable the affected cipher and HMACS. This consists of removing the ChaCha20 cipher and ETM HMACs via the appliance CLI.
Commands are as follows:
#(config ssh-console)ciphers remove [email protected] #(config ssh-console)hmacs remove [email protected] #(config ssh-console)hmacs remove [email protected] #(config ssh-console)hmacs remove [email protected] #(config ssh-console)hmacs remove [email protected],[email protected] #(config ssh-console)hmacs remove hmac-sha2-256 #(config ssh-console)hmacs remove hmac-sha1 #(config ssh-console)hmacs remove [email protected] #(config ssh-console)hmacs remove [email protected] #(config ssh-console)hmacs remove [email protected] #(config ssh-console)hmacs remove [email protected]
The other alternative is to force the use of GCM ciphers (which effectively removes ChaCha20 cipher and removes all CBC ciphers (which pair with ETM HMACS to produce the vulnerability). Depending on the interoperability required, this may be the preferred approach.
#(config ssh-console)ciphers set [email protected],[email protected]
The same steps are to be repeated for the SSH Client:
#(config ssh-client)