First published: Wed Feb 22 2017(Updated: )
The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to two Remote Command Injection vulnerabilities in its web administrative interface. These vulnerabilities occur in the diagnostics CGI (/cgi-bin/diagnostics) component responsible for emailing out information about the state of the system. The application doesn't properly escape the information passed in the 'tsrDeleteRestartedFile' or 'currentTSREmailTo' variables before making a call to system(), allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall Secure Remote Access | =8.1.0.2-14sv | |
=8.1.0.2-14sv |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9682 is classified as a high severity vulnerability due to the potential for remote command injection.
To fix CVE-2016-9682, update the SonicWall Secure Remote Access server to a version later than 8.1.0.2-14sv that includes security patches.
CVE-2016-9682 affects the diagnostics CGI component of the SonicWall Secure Remote Access server.
Yes, CVE-2016-9682 can be exploited remotely through the web administrative interface.
The potential impacts of CVE-2016-9682 include unauthorized command execution on the affected server.