Vulnerability identifier: #VU78336
Vulnerability risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-260
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
SonicWall GMS
Client/Desktop applications /
Other client software
SonicWall Analytics
Server applications /
IDS/IPS systems, Firewalls and proxy servers
Vendor: SonicWall
Description
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to the Tomcat application credentials are hardcoded in SonicWall GMS and Analytics configuration file, which leads to security restrictions bypass and privilege escalation.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
SonicWall GMS: 9.3.2-SP1
SonicWall Analytics: 2.5.0.4-R7
External links
http://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010
http://www.sonicwall.com/support/knowledge-base/urgent-security-notice-sonicwall-gms-analytics-impacted-by-suite-of-vulnerabilities/230710150218060/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.