First published: Thu Jul 13 2023(Updated: )
Path Traversal vulnerability in GMS and Analytics allows an authenticated attacker to read arbitrary files from the underlying filesystem with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
Credit: PSIRT@sonicwall.com PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall Analytics | <=2.5.0.4-r7 | |
SonicWALL Global Management System | <9.3.2 | |
SonicWALL Global Management System | =9.3.2 | |
SonicWALL Global Management System | =9.3.2-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-34125.
The severity of CVE-2023-34125 is medium with a CVSS score of 6.5.
CVE-2023-34125 affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
The vulnerability in GMS and Analytics is a path traversal vulnerability that allows an authenticated attacker to read arbitrary files from the underlying filesystem with root privileges.
To fix CVE-2023-34125, update GMS to version 9.3.2-SP2 or later, and update Analytics to version 3.0.0.1-R1 or later.