OS Command Injection Vulnerability in SMA100 SSL-VPN by SonicWall
CVE-2023-44221

7.2HIGH

Key Information:

Vendor

Sonicwall

Status
Vendor
CVE Published:
5 December 2023

Badges

📈 Trended📈 Score: 7,940💰 Ransomware👾 Exploit Exists🟣 EPSS 46%🦅 CISA Reported📰 News Worthy

What is CVE-2023-44221?

CVE-2023-44221 is a significant vulnerability identified in the SMA100 SSL-VPN by SonicWall, a product designed to provide secure remote access to organizational resources. This vulnerability arises from the improper handling of certain elements within the management interface, allowing a remote authenticated attacker with administrative privileges to perform OS command injection. If exploited, this can severely compromise the integrity and security of the systems utilizing this solution, potentially leading to unauthorized command execution and system manipulation.

Technical Details

The vulnerability stems from a flaw in the management interface of the SMA100 SSL-VPN, which fails to adequately neutralize harmful input. This lack of proper validation enables attackers who already possess administrative credentials to inject arbitrary operating system commands. The nature of this vulnerability allows command execution as a low-privileged 'nobody' user, which could lead to escalation and further exploit vulnerabilities within the operating system or network.

Potential Impact of CVE-2023-44221

  1. Unauthorized Access and Control: Exploitation of this vulnerability can grant attackers the ability to execute arbitrary commands on the affected system, enabling them to manipulate data and configurations without detection.

  2. Data Breaches: The command injection could lead to expose sensitive organizational data and credentials, resulting in potential data breaches and loss of confidential information.

  3. Increased Attack Surface: Successful exploitation may create a foothold for attackers to introduce further malicious tools or malware, leading to ransomware attacks or broader network compromises.

CISA has reported CVE-2023-44221

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2023-44221 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace as recent news articles suggest the vulnerability is being used by ransomware groups.

The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

SMA100 SMA 200 10.2.1.9-57sv and earlier versions

News Articles

2 SonicWall Vulnerabilities Under Active Exploit

The vulnerabilities affect SonicWall's SMA devices for secure remote access, which have been heavily targeted by threat actors in the past.

3 weeks ago

PoC Published for Exploited SonicWall Vulnerabilities

PoC code targeting two exploited SonicWall vulnerabilities was published just CISA added them to the KEV catalog.

3 weeks ago

watchTowr Warns of Active Exploitation of SonicWall SMA 100 Devices

watchTowr reveals active exploitation of SonicWall SMA 100 vulnerabilities (CVE-2024-38475 & CVE-2023-44221) leading to full system takeover.

3 weeks ago

References

EPSS Score

46% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • 📈

    Vulnerability started trending

  • 💰

    Used in Ransomware

  • 🦅

    CISA Reported

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by BleepingComputer

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2023-44221 : OS Command Injection Vulnerability in SMA100 SSL-VPN by SonicWall