First published: Thu Jul 13 2023(Updated: )
Path Traversal vulnerability in SonicWall GMS and Analytics allows a remote authenticated attacker to read arbitrary files from the underlying file system via web service. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
Credit: PSIRT@sonicwall.com PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall Analytics | <=2.5.0.4-r7 | |
SonicWALL Global Management System | <9.3.2 | |
SonicWALL Global Management System | =9.3.2 | |
SonicWALL Global Management System | =9.3.2-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID of this vulnerability is CVE-2023-34135.
The severity level of CVE-2023-34135 is medium with a severity value of 6.5.
This vulnerability affects SonicWall GMS versions 9.3.2-SP1 and earlier, and SonicWall Analytics versions 2.5.0.4-R7 and earlier.
A remote authenticated attacker can exploit this vulnerability by performing a path traversal attack through the web service, allowing them to read arbitrary files from the underlying file system.
Yes, you can find more information about this vulnerability at the following links: [SonicWall PSIRT Advisory](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010) and [SonicWall Support Notices](https://www.sonicwall.com/support/notices/230710150218060).