Remote Command Injection in SonicWall Secure Remote Access Server
CVE-2016-9682

9.8CRITICAL

Key Information:

Vendor
Dell
Vendor
CVE Published:
22 February 2017

Summary

The SonicWall Secure Remote Access server (specifically version 8.1.0.2-14sv) features remote command injection vulnerabilities within its web administrative interface. These vulnerabilities are linked to the diagnostics CGI component, which handles system status emails. Specifically, the parameters 'tsrDeleteRestartedFile' and 'currentTSREmailTo' are inadequately sanitized before invoking system calls, creating an avenue for attackers to execute arbitrary commands. Successful exploitation can grant an attacker shell access on the affected system, running under the context of the nobody user account.

References

EPSS Score

49% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.