First published: Thu Jul 13 2023(Updated: )
SonicWall GMS and Analytics CAS Web Services application use static values for authentication without proper checks leading to authentication bypass vulnerability. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
Credit: PSIRT@sonicwall.com PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall Analytics | <=2.5.0.4-r7 | |
SonicWALL Global Management System | <9.3.2 | |
SonicWALL Global Management System | =9.3.2 | |
SonicWALL Global Management System | =9.3.2-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-34137 is critical with a CVSS score of 9.8.
SonicWall GMS versions 9.3.2-SP1 and earlier, and Analytics versions 2.5.0.4-R7 and earlier are affected by CVE-2023-34137.
CVE-2023-34137 is an authentication bypass vulnerability in SonicWall GMS and Analytics CAS Web Services application, caused by the use of static values for authentication without proper checks.
To fix CVE-2023-34137, update SonicWall GMS to version 9.3.2-SP2 or later, and update Analytics to version 2.5.0.4-R8 or later.
Yes, you can find more information about CVE-2023-34137 in the SonicWall PSIRT advisory (https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010) and the SonicWall support notices (https://www.sonicwall.com/support/notices/230710150218060).