Multiple vulnerabilities in SonicWall NetExtender for Windows



Published: 2023-09-30
Risk High
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2023-44217
CVE-2023-44218
CWE-ID CWE-269
CWE-287
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
NetExtender for Windows
Client/Desktop applications / Other client software

Vendor SonicWall

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Improper Privilege Management

EUVDB-ID: #VU81298

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-44217

CWE-ID: CWE-269 - Improper Privilege Management

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges.

The vulnerability exists due to improper privilege management within the repair feature in SonicWall Net Extender MSI client. A local user can execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

NetExtender for Windows: 10.2.0.300 - 10.2.336

External links

http://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0013


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper Authentication

EUVDB-ID: #VU81297

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-44218

CWE-ID: CWE-287 - Improper Authentication

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in NetExtender Pre-Logon feature. A remote attacker on the local network can gain access to the host Windows operating system with SYSTEM level privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

NetExtender for Windows: 10.2.0.300 - 10.2.336

External links

http://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0014


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###