First published: Thu Jul 13 2023(Updated: )
Use of password hash instead of password for authentication vulnerability in SonicWall GMS and Analytics allows Pass-the-Hash attacks. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
Credit: PSIRT@sonicwall.com PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall Analytics | <=2.5.0.4-r7 | |
SonicWALL Global Management System | <9.3.2 | |
SonicWALL Global Management System | =9.3.2 | |
SonicWALL Global Management System | =9.3.2-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34132 is a vulnerability in SonicWall GMS and Analytics that allows Pass-the-Hash attacks due to the use of password hash instead of password for authentication.
CVE-2023-34132 has a severity rating of 9.8 (critical).
SonicWall GMS version 9.3.2-SP1 and earlier versions are affected by CVE-2023-34132.
SonicWall Analytics version 2.5.0.4-R7 and earlier versions are affected by CVE-2023-34132.
To fix CVE-2023-34132, update your SonicWall GMS to version 9.3.2-SP2 or later, and update your SonicWall Analytics to version 2.5.0.4-R8 or later.