First published: Thu Jul 13 2023(Updated: )
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in SonicWall GMS, SonicWall Analytics enables an authenticated attacker to execute arbitrary code with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
Credit: PSIRT@sonicwall.com PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall Analytics | <=2.5.0.4-r7 | |
SonicWALL Global Management System | <9.3.2 | |
SonicWALL Global Management System | =9.3.2 | |
SonicWALL Global Management System | =9.3.2-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-34127.
The severity of CVE-2023-34127 is high, with a CVSS score of 8.8.
CVE-2023-34127 affects SonicWall GMS versions 9.3.2-SP1 and earlier, and SonicWall Analytics version 2.5.0.4-r7.
An authenticated attacker can exploit CVE-2023-34127 to execute arbitrary code with root privileges by injecting OS commands.
Yes, SonicWall has released patches to address the vulnerability. Please refer to the vendor's advisory for more information.