Action not permitted
Modal body text goes here.
Modal Title
Modal Body
wid-sec-w-2023-1736
Vulnerability from csaf_certbund
Published
2023-07-12 22:00
Modified
2023-07-12 22:00
Summary
SonicWall GMS und SonicWall Analytics: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das SonicWall Global Management System (GMS) dient der zentralen Verwaltung von SonicWall Firewalls.
SonicWall Analytics ergänzt die SonicWall-Firewall-Produkte, indem es eine erweiterte Sichtbarkeit und Analyse der von den Firewalls generierten Netzwerkverkehrsdaten ermöglicht und so die Fähigkeiten zur Erkennung von und Reaktion auf Bedrohungen verbessert.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in SonicWall GMS und SonicWall Analytics ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern und Daten zu manipulieren.
Betroffene Betriebssysteme
- BIOS/Firmware
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Das SonicWall Global Management System (GMS) dient der zentralen Verwaltung von SonicWall Firewalls.\r\nSonicWall Analytics ergänzt die SonicWall-Firewall-Produkte, indem es eine erweiterte Sichtbarkeit und Analyse der von den Firewalls generierten Netzwerkverkehrsdaten ermöglicht und so die Fähigkeiten zur Erkennung von und Reaktion auf Bedrohungen verbessert.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in SonicWall GMS und SonicWall Analytics ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern und Daten zu manipulieren.", title: "Angriff", }, { category: "general", text: "- BIOS/Firmware", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-1736 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1736.json", }, { category: "self", summary: "WID-SEC-2023-1736 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1736", }, { category: "external", summary: "SonicWall Security Advisory vom 2023-07-12", url: "https://www.sonicwall.com/support/knowledge-base/urgent-security-notice-sonicwall-gms-analytics-impacted-by-suite-of-vulnerabilities/230710150218060/", }, { category: "external", summary: "SonicWall Security Advisory vom 2023-07-12", url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, ], source_lang: "en-US", title: "SonicWall GMS und SonicWall Analytics: Mehrere Schwachstellen", tracking: { current_release_date: "2023-07-12T22:00:00.000+00:00", generator: { date: "2024-08-15T17:55:24.044+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-1736", initial_release_date: "2023-07-12T22:00:00.000+00:00", revision_history: [ { date: "2023-07-12T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "SonicWall Analytics < 2.5.2", product: { name: "SonicWall Analytics < 2.5.2", product_id: "T028586", product_identification_helper: { cpe: "cpe:/a:sonicwall:analytics:2.5.2", }, }, }, { category: "product_name", name: "SonicWall GMS < 9.3.3", product: { name: "SonicWall GMS < 9.3.3", product_id: "T028585", product_identification_helper: { cpe: "cpe:/a:sonicwall:global_management_system:9.3.3", }, }, }, ], category: "vendor", name: "SonicWall", }, ], }, vulnerabilities: [ { cve: "CVE-2023-34137", notes: [ { category: "description", text: "In SonicWall GMS und SonicWall Analytics existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem durch einen vorhersehbaren Passwort-Reset-Schlüssel, willkürliche Dateilesevorgänge, Befehlsinjektionen und beliebige Dateiuploads. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einer dieser Schwachstellen erfordert erhöhte Rechte.", }, ], release_date: "2023-07-12T22:00:00.000+00:00", title: "CVE-2023-34137", }, { cve: "CVE-2023-34136", notes: [ { category: "description", text: "In SonicWall GMS und SonicWall Analytics existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem durch einen vorhersehbaren Passwort-Reset-Schlüssel, willkürliche Dateilesevorgänge, Befehlsinjektionen und beliebige Dateiuploads. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einer dieser Schwachstellen erfordert erhöhte Rechte.", }, ], release_date: "2023-07-12T22:00:00.000+00:00", title: "CVE-2023-34136", }, { cve: "CVE-2023-34135", notes: [ { category: "description", text: "In SonicWall GMS und SonicWall Analytics existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem durch einen vorhersehbaren Passwort-Reset-Schlüssel, willkürliche Dateilesevorgänge, Befehlsinjektionen und beliebige Dateiuploads. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einer dieser Schwachstellen erfordert erhöhte Rechte.", }, ], release_date: "2023-07-12T22:00:00.000+00:00", title: "CVE-2023-34135", }, { cve: "CVE-2023-34134", notes: [ { category: "description", text: "In SonicWall GMS und SonicWall Analytics existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem durch einen vorhersehbaren Passwort-Reset-Schlüssel, willkürliche Dateilesevorgänge, Befehlsinjektionen und beliebige Dateiuploads. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einer dieser Schwachstellen erfordert erhöhte Rechte.", }, ], release_date: "2023-07-12T22:00:00.000+00:00", title: "CVE-2023-34134", }, { cve: "CVE-2023-34133", notes: [ { category: "description", text: "In SonicWall GMS und SonicWall Analytics existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem durch einen vorhersehbaren Passwort-Reset-Schlüssel, willkürliche Dateilesevorgänge, Befehlsinjektionen und beliebige Dateiuploads. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einer dieser Schwachstellen erfordert erhöhte Rechte.", }, ], release_date: "2023-07-12T22:00:00.000+00:00", title: "CVE-2023-34133", }, { cve: "CVE-2023-34132", notes: [ { category: "description", text: "In SonicWall GMS und SonicWall Analytics existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem durch einen vorhersehbaren Passwort-Reset-Schlüssel, willkürliche Dateilesevorgänge, Befehlsinjektionen und beliebige Dateiuploads. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einer dieser Schwachstellen erfordert erhöhte Rechte.", }, ], release_date: "2023-07-12T22:00:00.000+00:00", title: "CVE-2023-34132", }, { cve: "CVE-2023-34131", notes: [ { category: "description", text: "In SonicWall GMS und SonicWall Analytics existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem durch einen vorhersehbaren Passwort-Reset-Schlüssel, willkürliche Dateilesevorgänge, Befehlsinjektionen und beliebige Dateiuploads. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einer dieser Schwachstellen erfordert erhöhte Rechte.", }, ], release_date: "2023-07-12T22:00:00.000+00:00", title: "CVE-2023-34131", }, { cve: "CVE-2023-34130", notes: [ { category: "description", text: "In SonicWall GMS und SonicWall Analytics existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem durch einen vorhersehbaren Passwort-Reset-Schlüssel, willkürliche Dateilesevorgänge, Befehlsinjektionen und beliebige Dateiuploads. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einer dieser Schwachstellen erfordert erhöhte Rechte.", }, ], release_date: "2023-07-12T22:00:00.000+00:00", title: "CVE-2023-34130", }, { cve: "CVE-2023-34129", notes: [ { category: "description", text: "In SonicWall GMS und SonicWall Analytics existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem durch einen vorhersehbaren Passwort-Reset-Schlüssel, willkürliche Dateilesevorgänge, Befehlsinjektionen und beliebige Dateiuploads. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einer dieser Schwachstellen erfordert erhöhte Rechte.", }, ], release_date: "2023-07-12T22:00:00.000+00:00", title: "CVE-2023-34129", }, { cve: "CVE-2023-34128", notes: [ { category: "description", text: "In SonicWall GMS und SonicWall Analytics existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem durch einen vorhersehbaren Passwort-Reset-Schlüssel, willkürliche Dateilesevorgänge, Befehlsinjektionen und beliebige Dateiuploads. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einer dieser Schwachstellen erfordert erhöhte Rechte.", }, ], release_date: "2023-07-12T22:00:00.000+00:00", title: "CVE-2023-34128", }, { cve: "CVE-2023-34127", notes: [ { category: "description", text: "In SonicWall GMS und SonicWall Analytics existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem durch einen vorhersehbaren Passwort-Reset-Schlüssel, willkürliche Dateilesevorgänge, Befehlsinjektionen und beliebige Dateiuploads. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einer dieser Schwachstellen erfordert erhöhte Rechte.", }, ], release_date: "2023-07-12T22:00:00.000+00:00", title: "CVE-2023-34127", }, { cve: "CVE-2023-34126", notes: [ { category: "description", text: "In SonicWall GMS und SonicWall Analytics existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem durch einen vorhersehbaren Passwort-Reset-Schlüssel, willkürliche Dateilesevorgänge, Befehlsinjektionen und beliebige Dateiuploads. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einer dieser Schwachstellen erfordert erhöhte Rechte.", }, ], release_date: "2023-07-12T22:00:00.000+00:00", title: "CVE-2023-34126", }, { cve: "CVE-2023-34125", notes: [ { category: "description", text: "In SonicWall GMS und SonicWall Analytics existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem durch einen vorhersehbaren Passwort-Reset-Schlüssel, willkürliche Dateilesevorgänge, Befehlsinjektionen und beliebige Dateiuploads. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einer dieser Schwachstellen erfordert erhöhte Rechte.", }, ], release_date: "2023-07-12T22:00:00.000+00:00", title: "CVE-2023-34125", }, { cve: "CVE-2023-34124", notes: [ { category: "description", text: "In SonicWall GMS und SonicWall Analytics existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem durch einen vorhersehbaren Passwort-Reset-Schlüssel, willkürliche Dateilesevorgänge, Befehlsinjektionen und beliebige Dateiuploads. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einer dieser Schwachstellen erfordert erhöhte Rechte.", }, ], release_date: "2023-07-12T22:00:00.000+00:00", title: "CVE-2023-34124", }, { cve: "CVE-2023-34123", notes: [ { category: "description", text: "In SonicWall GMS und SonicWall Analytics existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem durch einen vorhersehbaren Passwort-Reset-Schlüssel, willkürliche Dateilesevorgänge, Befehlsinjektionen und beliebige Dateiuploads. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einer dieser Schwachstellen erfordert erhöhte Rechte.", }, ], release_date: "2023-07-12T22:00:00.000+00:00", title: "CVE-2023-34123", }, ], }
cve-2023-34128
Vulnerability from cvelistv5
Published
2023-07-13 00:58
Modified
2024-10-31 17:55
Severity ?
EPSS score ?
Summary
Tomcat application credentials are hardcoded in SonicWall GMS and Analytics configuration file. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
References
▼ | URL | Tags |
---|---|---|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | vendor-advisory | |
https://www.sonicwall.com/support/notices/230710150218060 | related |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:01:54.218Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", "x_transferred", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-34128", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-31T17:55:38.893138Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-31T17:55:48.342Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "GMS", vendor: "SonicWall", versions: [ { status: "affected", version: "9.3.2-SP1 and earlier versions", }, ], }, { defaultStatus: "unknown", product: "Analytics", vendor: "SonicWall", versions: [ { status: "affected", version: "2.5.0.4-R7 and earlier versions", }, ], }, ], datePublic: "2023-07-13T00:58:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Tomcat application credentials are hardcoded in SonicWall GMS and Analytics configuration file. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.", }, ], value: "Tomcat application credentials are hardcoded in SonicWall GMS and Analytics configuration file. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-260", description: "CWE-260 Password in Configuration File", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-07-13T00:58:35.946Z", orgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", shortName: "sonicwall", }, references: [ { tags: [ "vendor-advisory", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", assignerShortName: "sonicwall", cveId: "CVE-2023-34128", datePublished: "2023-07-13T00:58:35.946Z", dateReserved: "2023-05-25T22:45:46.851Z", dateUpdated: "2024-10-31T17:55:48.342Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-34124
Vulnerability from cvelistv5
Published
2023-07-13 00:14
Modified
2025-04-08 15:23
Severity ?
EPSS score ?
Summary
The authentication mechanism in SonicWall GMS and Analytics Web Services had insufficient checks, allowing authentication bypass. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
References
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:01:53.646Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", "x_transferred", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, { tags: [ "x_transferred", ], url: "http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2023-34124", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-30T18:53:33.391833Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-04-08T15:23:32.589Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "GMS", vendor: "SonicWall", versions: [ { status: "affected", version: "9.3.2-SP1 and earlier versions", }, ], }, { defaultStatus: "unknown", product: "Analytics", vendor: "SonicWall", versions: [ { status: "affected", version: "2.5.0.4-R7 and earlier versions", }, ], }, ], datePublic: "2023-07-12T23:07:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "The authentication mechanism in SonicWall GMS and Analytics Web Services had insufficient checks, allowing authentication bypass. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.<p></p>", }, ], value: "The authentication mechanism in SonicWall GMS and Analytics Web Services had insufficient checks, allowing authentication bypass. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-305", description: "CWE-305 Authentication Bypass by Primary Weakness", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-09-08T22:06:25.270Z", orgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", shortName: "sonicwall", }, references: [ { tags: [ "vendor-advisory", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, { url: "http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", assignerShortName: "sonicwall", cveId: "CVE-2023-34124", datePublished: "2023-07-13T00:14:16.861Z", dateReserved: "2023-05-25T22:45:46.851Z", dateUpdated: "2025-04-08T15:23:32.589Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-34133
Vulnerability from cvelistv5
Published
2023-07-13 02:28
Modified
2025-02-13 16:55
Severity ?
EPSS score ?
Summary
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SonicWall GMS and Analytics allows an unauthenticated attacker to extract sensitive information from the application database. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
References
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:01:54.187Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", "x_transferred", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, { tags: [ "x_transferred", ], url: "http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "GMS", vendor: "SonicWall", versions: [ { status: "affected", version: "9.3.2-SP1 and earlier versions", }, ], }, { defaultStatus: "unknown", product: "Analytics", vendor: "SonicWall", versions: [ { status: "affected", version: "2.5.0.4-R7 and earlier versions", }, ], }, ], datePublic: "2023-07-13T02:28:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SonicWall GMS and Analytics allows an unauthenticated attacker to extract sensitive information from the application database. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.", }, ], value: "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SonicWall GMS and Analytics allows an unauthenticated attacker to extract sensitive information from the application database. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-09-08T22:06:20.378Z", orgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", shortName: "sonicwall", }, references: [ { tags: [ "vendor-advisory", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, { url: "http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", assignerShortName: "sonicwall", cveId: "CVE-2023-34133", datePublished: "2023-07-13T02:28:35.751Z", dateReserved: "2023-05-25T22:45:46.852Z", dateUpdated: "2025-02-13T16:55:19.752Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-34135
Vulnerability from cvelistv5
Published
2023-07-13 02:37
Modified
2024-10-30 18:52
Severity ?
EPSS score ?
Summary
Path Traversal vulnerability in SonicWall GMS and Analytics allows a remote authenticated attacker to read arbitrary files from the underlying file system via web service. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
References
▼ | URL | Tags |
---|---|---|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | vendor-advisory | |
https://www.sonicwall.com/support/notices/230710150218060 | related |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:01:54.176Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", "x_transferred", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-34135", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-30T18:51:59.978476Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-30T18:52:08.987Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "GMS", vendor: "SonicWall", versions: [ { status: "affected", version: "9.3.2-SP1 and earlier versions", }, ], }, { defaultStatus: "unknown", product: "Analytics", vendor: "SonicWall", versions: [ { status: "affected", version: "2.5.0.4-R7 and earlier versions", }, ], }, ], datePublic: "2023-07-13T02:40:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Path Traversal vulnerability in SonicWall GMS and Analytics allows a remote authenticated attacker to read arbitrary files from the underlying file system via web service. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.<p></p>", }, ], value: "Path Traversal vulnerability in SonicWall GMS and Analytics allows a remote authenticated attacker to read arbitrary files from the underlying file system via web service. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.\n\n", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-36", description: "CWE-36 Absolute Path Traversal", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-07-13T02:37:59.279Z", orgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", shortName: "sonicwall", }, references: [ { tags: [ "vendor-advisory", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", assignerShortName: "sonicwall", cveId: "CVE-2023-34135", datePublished: "2023-07-13T02:37:59.279Z", dateReserved: "2023-05-25T22:45:46.852Z", dateUpdated: "2024-10-30T18:52:08.987Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-34125
Vulnerability from cvelistv5
Published
2023-07-13 00:21
Modified
2024-11-05 15:34
Severity ?
EPSS score ?
Summary
Path Traversal vulnerability in GMS and Analytics allows an authenticated attacker to read arbitrary files from the underlying filesystem with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
References
▼ | URL | Tags |
---|---|---|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | vendor-advisory | |
https://www.sonicwall.com/support/notices/230710150218060 | related |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:01:54.052Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", "x_transferred", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-34125", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-05T15:34:38.926559Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-05T15:34:52.319Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "GMS", vendor: "SonicWall", versions: [ { status: "affected", version: "9.3.2-SP1 and earlier versions", }, ], }, { defaultStatus: "unknown", product: "Analytics", vendor: "SonicWall", versions: [ { status: "affected", version: "2.5.0.4-R7 and earlier versions", }, ], }, ], datePublic: "2023-07-13T00:19:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Path Traversal vulnerability in GMS and Analytics allows an authenticated attacker to read arbitrary files from the underlying filesystem with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.<p></p>", }, ], value: "Path Traversal vulnerability in GMS and Analytics allows an authenticated attacker to read arbitrary files from the underlying filesystem with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.\n\n", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-27", description: "CWE-27 Path Traversal: 'dir/../../filename'", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-07-13T00:21:21.095Z", orgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", shortName: "sonicwall", }, references: [ { tags: [ "vendor-advisory", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", assignerShortName: "sonicwall", cveId: "CVE-2023-34125", datePublished: "2023-07-13T00:21:21.095Z", dateReserved: "2023-05-25T22:45:46.851Z", dateUpdated: "2024-11-05T15:34:52.319Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-34137
Vulnerability from cvelistv5
Published
2023-07-13 02:43
Modified
2024-10-30 18:49
Severity ?
EPSS score ?
Summary
SonicWall GMS and Analytics CAS Web Services application use static values for authentication without proper checks leading to authentication bypass vulnerability. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
References
▼ | URL | Tags |
---|---|---|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | vendor-advisory | |
https://www.sonicwall.com/support/notices/230710150218060 | related |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:01:53.617Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", "x_transferred", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-34137", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-30T18:49:13.419958Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-30T18:49:22.304Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "GMS", vendor: "SonicWall", versions: [ { status: "affected", version: "9.3.2-SP1 and earlier versions", }, ], }, { defaultStatus: "unknown", product: "Analytics", vendor: "SonicWall", versions: [ { status: "affected", version: "2.5.0.4-R7 and earlier versions", }, ], }, ], datePublic: "2023-07-13T02:43:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "SonicWall GMS and Analytics CAS Web Services application use static values for authentication without proper checks leading to authentication bypass vulnerability. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.<p></p>", }, ], value: "SonicWall GMS and Analytics CAS Web Services application use static values for authentication without proper checks leading to authentication bypass vulnerability. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.\n\n", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-305", description: "CWE-305: Authentication Bypass by Primary Weakness", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-07-13T02:43:08.405Z", orgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", shortName: "sonicwall", }, references: [ { tags: [ "vendor-advisory", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", assignerShortName: "sonicwall", cveId: "CVE-2023-34137", datePublished: "2023-07-13T02:43:08.405Z", dateReserved: "2023-05-25T22:45:46.852Z", dateUpdated: "2024-10-30T18:49:22.304Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-34127
Vulnerability from cvelistv5
Published
2023-07-13 00:47
Modified
2025-02-13 16:55
Severity ?
EPSS score ?
Summary
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in SonicWall GMS, SonicWall Analytics enables an authenticated attacker to execute arbitrary code with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
References
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:01:53.890Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", "x_transferred", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, { tags: [ "x_transferred", ], url: "http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "GMS", vendor: "SonicWall", versions: [ { status: "affected", version: "9.3.2-SP1 and earlier versions", }, ], }, { defaultStatus: "unknown", product: "Analytics", vendor: "SonicWall", versions: [ { status: "affected", version: "2.5.0.4-R7 and earlier versions", }, ], }, ], datePublic: "2023-07-12T23:07:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in SonicWall GMS, SonicWall Analytics enables an authenticated attacker to execute arbitrary code with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.", }, ], value: "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in SonicWall GMS, SonicWall Analytics enables an authenticated attacker to execute arbitrary code with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-78", description: "CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-09-08T22:06:22.060Z", orgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", shortName: "sonicwall", }, references: [ { tags: [ "vendor-advisory", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, { url: "http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", assignerShortName: "sonicwall", cveId: "CVE-2023-34127", datePublished: "2023-07-13T00:47:58.798Z", dateReserved: "2023-05-25T22:45:46.851Z", dateUpdated: "2025-02-13T16:55:18.492Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-34132
Vulnerability from cvelistv5
Published
2023-07-13 02:24
Modified
2025-02-13 16:55
Severity ?
EPSS score ?
Summary
Use of password hash instead of password for authentication vulnerability in SonicWall GMS and Analytics allows Pass-the-Hash attacks. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
References
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:01:53.958Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", "x_transferred", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, { tags: [ "x_transferred", ], url: "http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-34132", options: [ { Exploitation: "poc", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-30T19:15:29.760186Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-30T19:15:42.425Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "GMS", vendor: "SonicWall", versions: [ { status: "affected", version: "9.3.2-SP1 and earlier versions", }, ], }, { defaultStatus: "unknown", product: "Analytics", vendor: "SonicWall", versions: [ { status: "affected", version: "2.5.0.4-R7 and earlier versions", }, ], }, ], datePublic: "2023-07-12T23:07:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Use of password hash instead of password for authentication vulnerability in SonicWall GMS and Analytics allows Pass-the-Hash attacks. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.", }, ], value: "Use of password hash instead of password for authentication vulnerability in SonicWall GMS and Analytics allows Pass-the-Hash attacks. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-836", description: "CWE-836 Use of Password Hash Instead of Password for Authentication", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-09-08T22:06:23.649Z", orgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", shortName: "sonicwall", }, references: [ { tags: [ "vendor-advisory", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, { url: "http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", assignerShortName: "sonicwall", cveId: "CVE-2023-34132", datePublished: "2023-07-13T02:24:25.820Z", dateReserved: "2023-05-25T22:45:46.852Z", dateUpdated: "2025-02-13T16:55:19.088Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-34134
Vulnerability from cvelistv5
Published
2023-07-13 02:35
Modified
2024-10-30 18:52
Severity ?
EPSS score ?
Summary
Exposure of sensitive information to an unauthorized actor vulnerability in SonicWall GMS and Analytics allows authenticated attacker to read administrator password hash via a web service call. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
References
▼ | URL | Tags |
---|---|---|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | vendor-advisory | |
https://www.sonicwall.com/support/notices/230710150218060 | related |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:01:53.950Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", "x_transferred", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-34134", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-30T18:52:28.717741Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-30T18:52:38.438Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "GMS", vendor: "SonicWall", versions: [ { status: "affected", version: "9.3.2-SP1 and earlier versions", }, ], }, { defaultStatus: "unknown", product: "Analytics", vendor: "SonicWall", versions: [ { status: "affected", version: "2.5.0.4-R7 and earlier versions", }, ], }, ], datePublic: "2023-07-13T02:35:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Exposure of sensitive information to an unauthorized actor vulnerability in SonicWall GMS and Analytics allows authenticated attacker to read administrator password hash via a web service call. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.<p></p>", }, ], value: "Exposure of sensitive information to an unauthorized actor vulnerability in SonicWall GMS and Analytics allows authenticated attacker to read administrator password hash via a web service call. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.\n\n", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-200", description: "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-07-13T02:35:41.109Z", orgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", shortName: "sonicwall", }, references: [ { tags: [ "vendor-advisory", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", assignerShortName: "sonicwall", cveId: "CVE-2023-34134", datePublished: "2023-07-13T02:35:41.109Z", dateReserved: "2023-05-25T22:45:46.852Z", dateUpdated: "2024-10-30T18:52:38.438Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-34131
Vulnerability from cvelistv5
Published
2023-07-13 02:20
Modified
2024-10-30 19:18
Severity ?
EPSS score ?
Summary
Exposure of sensitive information to an unauthorized actor vulnerability in SonicWall GMS and Analytics enables an unauthenticated attacker to access restricted web pages. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
References
▼ | URL | Tags |
---|---|---|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | vendor-advisory | |
https://www.sonicwall.com/support/notices/230710150218060 | related |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:01:54.048Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", "x_transferred", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-34131", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-30T19:18:09.777415Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-30T19:18:21.598Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "GMS", vendor: "SonicWall", versions: [ { status: "affected", version: "9.3.2-SP1 and earlier versions", }, ], }, { defaultStatus: "unknown", product: "Analytics", vendor: "SonicWall", versions: [ { status: "affected", version: "2.5.0.4-R7 and earlier versions", }, ], }, ], datePublic: "2023-07-13T02:21:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Exposure of sensitive information to an unauthorized actor vulnerability in SonicWall GMS and Analytics enables an unauthenticated attacker to access restricted web pages. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.", }, ], value: "Exposure of sensitive information to an unauthorized actor vulnerability in SonicWall GMS and Analytics enables an unauthenticated attacker to access restricted web pages. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-200", description: "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-07-13T02:20:39.413Z", orgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", shortName: "sonicwall", }, references: [ { tags: [ "vendor-advisory", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", assignerShortName: "sonicwall", cveId: "CVE-2023-34131", datePublished: "2023-07-13T02:20:39.413Z", dateReserved: "2023-05-25T22:45:46.852Z", dateUpdated: "2024-10-30T19:18:21.598Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-34126
Vulnerability from cvelistv5
Published
2023-07-13 00:44
Modified
2024-10-31 17:58
Severity ?
EPSS score ?
Summary
Vulnerability in SonicWall GMS and Analytics allows an authenticated attacker to upload files on the underlying filesystem with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
References
▼ | URL | Tags |
---|---|---|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | vendor-advisory | |
https://www.sonicwall.com/support/notices/230710150218060 | related |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:01:54.168Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", "x_transferred", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-34126", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-31T17:58:06.640728Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-31T17:58:17.736Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "GMS", vendor: "SonicWall", versions: [ { status: "affected", version: "9.3.2-SP1 and earlier versions", }, ], }, { defaultStatus: "unknown", product: "Analytics", vendor: "SonicWall", versions: [ { status: "affected", version: "2.5.0.4-R7 and earlier versions", }, ], }, ], datePublic: "2023-07-13T00:42:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Vulnerability in SonicWall GMS and Analytics allows an authenticated attacker to upload files on the underlying filesystem with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.", }, ], value: "Vulnerability in SonicWall GMS and Analytics allows an authenticated attacker to upload files on the underlying filesystem with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-434", description: "CWE-434 Unrestricted Upload of File with Dangerous Type", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-07-13T00:44:10.845Z", orgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", shortName: "sonicwall", }, references: [ { tags: [ "vendor-advisory", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", assignerShortName: "sonicwall", cveId: "CVE-2023-34126", datePublished: "2023-07-13T00:44:10.845Z", dateReserved: "2023-05-25T22:45:46.851Z", dateUpdated: "2024-10-31T17:58:17.736Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-34136
Vulnerability from cvelistv5
Published
2023-07-13 02:40
Modified
2024-10-30 18:50
Severity ?
EPSS score ?
Summary
Vulnerability in SonicWall GMS and Analytics allows unauthenticated attacker to upload files to a restricted location not controlled by the attacker. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
References
▼ | URL | Tags |
---|---|---|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | vendor-advisory | |
https://www.sonicwall.com/support/notices/230710150218060 | related |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:01:53.682Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", "x_transferred", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-34136", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-30T18:50:17.908815Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-30T18:50:27.471Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "GMS", vendor: "SonicWall", versions: [ { status: "affected", version: "9.3.2-SP1 and earlier versions", }, ], }, { defaultStatus: "unknown", product: "Analytics", vendor: "SonicWall", versions: [ { status: "affected", version: "2.5.0.4-R7 and earlier versions", }, ], }, ], datePublic: "2023-07-13T02:40:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Vulnerability in SonicWall GMS and Analytics allows unauthenticated attacker to upload files to a restricted location not controlled by the attacker. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.", }, ], value: "Vulnerability in SonicWall GMS and Analytics allows unauthenticated attacker to upload files to a restricted location not controlled by the attacker. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-434", description: "CWE-434 Unrestricted Upload of File with Dangerous Type", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-07-13T02:40:20.667Z", orgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", shortName: "sonicwall", }, references: [ { tags: [ "vendor-advisory", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", assignerShortName: "sonicwall", cveId: "CVE-2023-34136", datePublished: "2023-07-13T02:40:20.667Z", dateReserved: "2023-05-25T22:45:46.852Z", dateUpdated: "2024-10-30T18:50:27.471Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-34129
Vulnerability from cvelistv5
Published
2023-07-13 01:03
Modified
2024-10-30 18:53
Severity ?
EPSS score ?
Summary
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in SonicWall GMS and Analytics allows an authenticated remote attacker to traverse the directory and extract arbitrary files using Zip Slip method to any location on the underlying filesystem with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
References
▼ | URL | Tags |
---|---|---|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | vendor-advisory | |
https://www.sonicwall.com/support/notices/230710150218060 | related |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:01:54.159Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", "x_transferred", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-34129", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-30T18:52:57.463645Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-30T18:53:10.286Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "GMS", vendor: "SonicWall", versions: [ { status: "affected", version: "9.3.2-SP1 and earlier versions", }, ], }, { defaultStatus: "unknown", product: "Analytics", vendor: "SonicWall", versions: [ { status: "affected", version: "2.5.0.4-R7 and earlier versions", }, ], }, ], datePublic: "2023-07-12T23:07:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in SonicWall GMS and Analytics allows an authenticated remote attacker to traverse the directory and extract arbitrary files using Zip Slip method to any location on the underlying filesystem with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.<p></p>", }, ], value: "Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in SonicWall GMS and Analytics allows an authenticated remote attacker to traverse the directory and extract arbitrary files using Zip Slip method to any location on the underlying filesystem with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.\n\n", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-22", description: "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-07-13T01:03:51.894Z", orgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", shortName: "sonicwall", }, references: [ { tags: [ "vendor-advisory", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", assignerShortName: "sonicwall", cveId: "CVE-2023-34129", datePublished: "2023-07-13T01:03:51.894Z", dateReserved: "2023-05-25T22:45:46.851Z", dateUpdated: "2024-10-30T18:53:10.286Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-34123
Vulnerability from cvelistv5
Published
2023-07-12 23:16
Modified
2024-11-06 17:01
Severity ?
EPSS score ?
Summary
Use of Hard-coded Cryptographic Key vulnerability in SonicWall GMS, SonicWall Analytics. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
References
▼ | URL | Tags |
---|---|---|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | vendor-advisory | |
https://www.sonicwall.com/support/notices/230710150218060 | related |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:01:54.020Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", "x_transferred", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-34123", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-06T17:00:38.382269Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-06T17:01:05.956Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "GMS", vendor: "SonicWall", versions: [ { status: "affected", version: "9.3.2-SP1 and earlier versions", }, ], }, { defaultStatus: "unknown", product: "Analytics", vendor: "SonicWall", versions: [ { status: "affected", version: "2.5.0.4-R7 and earlier versions", }, ], }, ], datePublic: "2023-07-12T23:07:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Use of Hard-coded Cryptographic Key vulnerability in SonicWall GMS, SonicWall Analytics. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.<p></p>", }, ], value: "Use of Hard-coded Cryptographic Key vulnerability in SonicWall GMS, SonicWall Analytics. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.\n\n", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-321", description: "CWE-321 Use of Hard-coded Cryptographic Key", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-07-13T00:22:30.529Z", orgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", shortName: "sonicwall", }, references: [ { tags: [ "vendor-advisory", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", assignerShortName: "sonicwall", cveId: "CVE-2023-34123", datePublished: "2023-07-12T23:16:31.146Z", dateReserved: "2023-05-25T22:45:46.850Z", dateUpdated: "2024-11-06T17:01:05.956Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-34130
Vulnerability from cvelistv5
Published
2023-07-13 01:06
Modified
2024-10-30 19:55
Severity ?
EPSS score ?
Summary
SonicWall GMS and Analytics use outdated Tiny Encryption Algorithm (TEA) with a hardcoded key to encrypt sensitive data. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
References
▼ | URL | Tags |
---|---|---|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | vendor-advisory | |
https://www.sonicwall.com/support/notices/230710150218060 | related |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:01:54.169Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", "x_transferred", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-34130", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-30T19:55:20.321751Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-30T19:55:38.482Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "GMS", vendor: "SonicWall", versions: [ { status: "affected", version: "9.3.2-SP1 and earlier versions", }, ], }, { defaultStatus: "unknown", product: "Analytics", vendor: "SonicWall", versions: [ { status: "affected", version: "2.5.0.4-R7 and earlier versions", }, ], }, ], datePublic: "2023-07-12T23:07:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "SonicWall GMS and Analytics use outdated Tiny Encryption Algorithm (TEA) with a hardcoded key to encrypt sensitive data. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.<p></p>", }, ], value: "SonicWall GMS and Analytics use outdated Tiny Encryption Algorithm (TEA) with a hardcoded key to encrypt sensitive data. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.\n\n", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-327", description: "CWE-327 Use of a Broken or Risky Cryptographic Algorithm", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-07-13T01:06:27.492Z", orgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", shortName: "sonicwall", }, references: [ { tags: [ "vendor-advisory", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010", }, { tags: [ "related", ], url: "https://www.sonicwall.com/support/notices/230710150218060", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "44b2ff79-1416-4492-88bb-ed0da00c7315", assignerShortName: "sonicwall", cveId: "CVE-2023-34130", datePublished: "2023-07-13T01:06:27.492Z", dateReserved: "2023-05-25T22:45:46.851Z", dateUpdated: "2024-10-30T19:55:38.482Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.