Resolution
Upgrade to a patched version now available for download:
For SPS 7.0.5.1 LTS is available for Download Here
For SPS 7.5.1 is available for Download Here
Impacted Versions
- All LTS before 7.0.5.1
- All feature versions before 7.5.1
Further details and mitigation factors:
- Authentication bypass is only practical when a credential store (e.g. Safeguard for Privileged Passwords) is configured in the connection policy. Otherwise, the attacker must perform a second authentication step at the target resource.
- It is not possible to perform the attack invisibly, because the vulnerable sensitive information can only be used once, and only within a fixed time window. The attacker can not mount an attack without a victim performing the gateway authentication first.
- The attacker might get access to a single session, which is recorded and monitored by SPS.
- The attacker can not set the details of the obtained session. The target server and the account is determined by the victim’s connection and the SPS configuration only.
- The integrity of the SPS appliance is not affected by this vulnerability.
- Other supported protocols than RDP are not affected by this vulnerability.
There is no known exploitation of this issue.