#VU72720 Stack-based buffer overflow in SonicOS


Published: 2023-04-04 | Updated: 2024-01-18

Vulnerability identifier: #VU72720

Vulnerability risk: Medium

CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2023-0656

CWE-ID: CWE-121

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
SonicOS
Operating systems & Components / Operating system

Vendor: SonicWall

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the web management interface of SonicWall FireWalls. A remote unauthenticated attacker can send specially crafted request to the system, trigger a stack-based buffer overflow and perform a denial of service (DoS) attack.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

SonicOS: 6.5 - 7.0.1.0-5051-R843


External links
http://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0004
http://ssd-disclosure.com/ssd-advisory-sonicwall-ssl-vpn-out-of-bounds-write-dos


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability