7.2

CVE-2023-44221

Warning
Media report

Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user, potentially leading to OS Command Injection Vulnerability.

Data is provided by the National Vulnerability Database (NVD)
SonicwallSma 200 Firmware Version <= 10.2.1.9-57sv
   SonicwallSma 200 Version-
SonicwallSma 210 Firmware Version <= 10.2.1.9-57sv
   SonicwallSma 210 Version-
SonicwallSma 400 Firmware Version <= 10.2.1.9-57sv
   SonicwallSma 400 Version-
SonicwallSma 410 Firmware Version <= 10.2.1.9-57sv
   SonicwallSma 410 Version-
SonicwallSma 500v Firmware Version <= 10.2.1.9-57sv
   SonicwallSma 500v Version-

01.05.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog

SonicWall SMA100 Appliances OS Command Injection Vulnerability

Vulnerability

SonicWall SMA100 appliances contain an OS command injection vulnerability in the SSL-VPN management interface that allows a remote, authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user.

Description

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 18.48% 0.95
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.2 1.2 5.9
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.2 1.2 5.9
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.