First published: Fri Aug 03 2018(Updated: )
A vulnerability in lack of validation of user-supplied parameters pass to XML-RPC calls on SonicWall Global Management System (GMS) virtual appliance's, allow remote user to execute arbitrary code. This vulnerability affected GMS version 8.1 and earlier.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWALL Global Management System | <=8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-9866 is critical with a score of 9.8 out of 10.
SonicWALL Global Management System (GMS) version 8.1 and earlier is affected by CVE-2018-9866.
CVE-2018-9866 allows a remote user to execute arbitrary code on the affected SonicWALL Global Management System (GMS) virtual appliance.
Yes, updating to a version later than 8.1 of SonicWALL Global Management System (GMS) resolves the vulnerability.
You can find more information about CVE-2018-9866 on the following references: [Github](https://github.com/rapid7/metasploit-framework/pull/10305), [SonicWall](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0007), [Twitter](https://twitter.com/ddouhine/status/1019251292202586112).