First published: Tue Dec 05 2023(Updated: )
Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user, potentially leading to OS Command Injection Vulnerability.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
SonicWall SMA 200 | <=10.2.1.9-57sv | |
SonicWall SMA 200 firmware | ||
All of | ||
SonicWall SMA 210 | <=10.2.1.9-57sv | |
SonicWall SMA 210 Firmware | ||
All of | ||
SonicWall SMA 400 | <=10.2.1.9-57sv | |
SonicWall SMA 400 firmware | ||
All of | ||
SonicWall SMA 410 | <=10.2.1.9-57sv | |
SonicWall SMA 410 | ||
All of | ||
SonicWall SMA 500v Firmware | <=10.2.1.9-57sv | |
SonicWall SMA 500v Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-44221 has been classified with a medium to high severity, indicating a significant risk for systems affected.
To mitigate CVE-2023-44221, users should upgrade to the latest firmware versions of the SonicWall SMA series that address this vulnerability.
CVE-2023-44221 impacts SonicWall SMA models 200, 210, 400, 410, and 500v running firmware versions up to and including 10.2.1.9-57sv.
CVE-2023-44221 is categorized as an OS command injection vulnerability due to improper neutralization in the SSL-VPN management interface.
Yes, CVE-2023-44221 can be exploited by a remote authenticated attacker with administrative privileges.