First published: Thu Jul 13 2023(Updated: )
Exposure of sensitive information to an unauthorized actor vulnerability in SonicWall GMS and Analytics allows authenticated attacker to read administrator password hash via a web service call. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
Credit: PSIRT@sonicwall.com PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall Analytics | <=2.5.0.4-r7 | |
SonicWALL Global Management System | <9.3.2 | |
SonicWALL Global Management System | =9.3.2 | |
SonicWALL Global Management System | =9.3.2-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this SonicWall GMS and Analytics vulnerability is CVE-2023-34134.
The severity level of CVE-2023-34134 is medium.
CVE-2023-34134 affects GMS versions 9.3.2-SP1 and earlier, and Analytics versions 2.5.0.4-R7 and earlier.
An authenticated attacker can read the administrator password hash via a web service call to exploit CVE-2023-34134.
More information about CVE-2023-34134 can be found at the following references: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 and https://www.sonicwall.com/support/notices/230710150218060.