← Zuruck zu CVEs
CVE-2023-34127
HIGH8.8
Beschreibung
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in SonicWall GMS, SonicWall Analytics enables an authenticated attacker to execute arbitrary code with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
CVE Details
CVSS v3.1 Bewertung8.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht7/13/2023
Zuletzt geandert4/23/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
sonicwall:analyticssonicwall:global_management_system
Schwachen (CWE)
CWE-78CWE-78
Referenzen
http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html(PSIRT@sonicwall.com)
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010(PSIRT@sonicwall.com)
https://www.sonicwall.com/support/notices/230710150218060(PSIRT@sonicwall.com)
http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010(af854a3a-2127-422b-91ae-364da2661108)
https://www.sonicwall.com/support/notices/230710150218060(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.