Remote Command Injection in SonicWall Secure Remote Access Server
CVE-2016-9682
9.8CRITICAL
Key Information:
- Vendor
Dell
- Vendor
- CVE Published:
- 22 February 2017
What is CVE-2016-9682?
The SonicWall Secure Remote Access server (specifically version 8.1.0.2-14sv) features remote command injection vulnerabilities within its web administrative interface. These vulnerabilities are linked to the diagnostics CGI component, which handles system status emails. Specifically, the parameters 'tsrDeleteRestartedFile' and 'currentTSREmailTo' are inadequately sanitized before invoking system calls, creating an avenue for attackers to execute arbitrary commands. Successful exploitation can grant an attacker shell access on the affected system, running under the context of the nobody user account.
References
EPSS Score
38% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved