First published: Mon Aug 21 2023(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of SonicWALL GMS Virtual Appliance. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWALL Global Management System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-20914 has a high severity rating due to its potential for remote arbitrary code execution.
ZDI-CAN-20914 can be exploited by remote attackers who can bypass the existing authentication mechanism.
To fix ZDI-CAN-20914, apply the latest security patches provided by SonicWALL for the GMS Virtual Appliance.
The impacts of ZDI-CAN-20914 include the potential for unauthorized access and control over the affected SonicWALL GMS Virtual Appliance.
No, user authentication alone is not sufficient to protect against ZDI-CAN-20914 as the authentication can be bypassed.