#VU78336 Password in Configuration File in SonicWall GMS and SonicWall Analytics


Published: 2023-07-18

Vulnerability identifier: #VU78336

Vulnerability risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-34128

CWE-ID: CWE-260

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
SonicWall GMS
Client/Desktop applications / Other client software
SonicWall Analytics
Server applications / IDS/IPS systems, Firewalls and proxy servers

Vendor: SonicWall

Description

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to the Tomcat application credentials are hardcoded in SonicWall GMS and Analytics configuration file, which leads to security restrictions bypass and privilege escalation.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

SonicWall GMS: 9.3.2-SP1

SonicWall Analytics: 2.5.0.4-R7


External links
http://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010
http://www.sonicwall.com/support/knowledge-base/urgent-security-notice-sonicwall-gms-analytics-impacted-by-suite-of-vulnerabilities/230710150218060/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability