Remote Command Injection in SonicWall Secure Remote Access Server
CVE-2016-9682
9.8CRITICAL
Key Information:
- Vendor
- Dell
- Vendor
- CVE Published:
- 22 February 2017
Summary
The SonicWall Secure Remote Access server (specifically version 8.1.0.2-14sv) features remote command injection vulnerabilities within its web administrative interface. These vulnerabilities are linked to the diagnostics CGI component, which handles system status emails. Specifically, the parameters 'tsrDeleteRestartedFile' and 'currentTSREmailTo' are inadequately sanitized before invoking system calls, creating an avenue for attackers to execute arbitrary commands. Successful exploitation can grant an attacker shell access on the affected system, running under the context of the nobody user account.
References
EPSS Score
49% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved