Vulnerability identifier: #VU52039
Vulnerability risk: High
CVSSv3.1:
CVE-ID:
CWE-ID:
CWE-434
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
SonicWall On-premise Email Security (ES)
Client/Desktop applications /
Antivirus software/Personal firewalls
SonicWall Hosted Email Security (HES)
Client/Desktop applications /
Antivirus software/Personal firewalls
Vendor:
Description
The vulnerability allows a remote user to compromise vulnerable system.
The vulnerability exists due to insufficient validation of file during file upload within the branding feature. A remote administrator can upload a malicious ZIP archive to the system to an arbitrary location using directory traversal sequences in the filenames inside the uploaded archive and compromise the affected system.
Note, the vulnerability is being actively exploited in the wild.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
External links
http://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0008
http://www.fireeye.com/blog/threat-research/2021/04/zero-day-exploits-in-sonicwall-email-security-lead-to-compromise.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?