An independent security researcher working through Beyond Security's SecuriTeam Secure Disclosure program has reported a vulnerability in Trustwave SWG.
The vulnerability is due to a condition that exists within the affected software that allows for remote authentication and authorization bypass. An attacker exploiting this vulnerability could gain unauthorized, privileged access to a vulnerable system.
To exploit this vulnerability, the attacker may need access to trusted or internal networks in which the vulnerable system resides. This access requirement could reduce the likelihood of a successful exploit.
This vulnerability affects Trustwave SWG version 11.8 and prior. Trustwave has released software updates for all affected software versions and administrators are advised to apply the appropriate updates as soon as possible.
Administrators should use SWG's IP-based access control lists feature (ACLs) to allow only trusted and relevant systems to access the affected systems.