2023-12-05 23:00:21 +00:00
{
"id" : "CVE-2023-44221" ,
"sourceIdentifier" : "PSIRT@sonicwall.com" ,
"published" : "2023-12-05T21:15:07.150" ,
2023-12-13 17:08:24 +00:00
"lastModified" : "2023-12-13T15:33:56.183" ,
"vulnStatus" : "Analyzed" ,
2023-12-05 23:00:21 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user, potentially leading to OS Command Injection Vulnerability."
2023-12-13 17:08:24 +00:00
} ,
{
"lang" : "es" ,
"value" : "La neutralizaci\u00f3n inadecuada de elementos especiales en la interfaz de administraci\u00f3n SMA100 SSL-VPN permite que un atacante remoto autenticado con privilegios administrativos inyecte comandos arbitrarios como un usuario \"nobody\", lo que podr\u00eda provocar una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo."
2023-12-05 23:00:21 +00:00
}
] ,
2023-12-13 17:08:24 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.2 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.2 ,
"impactScore" : 5.9
}
]
} ,
2023-12-05 23:00:21 +00:00
"weaknesses" : [
2023-12-13 17:08:24 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-78"
}
]
} ,
2023-12-05 23:00:21 +00:00
{
"source" : "PSIRT@sonicwall.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-78"
}
]
}
] ,
2023-12-13 17:08:24 +00:00
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sonicwall:sma_200_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "10.2.1.9-57sv" ,
"matchCriteriaId" : "4674E718-3642-4042-82DE-49B845CF2DC6"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:sonicwall:sma_200:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0B190266-AD6F-401B-9B2E-061CDD539236"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sonicwall:sma_210_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "10.2.1.9-57sv" ,
"matchCriteriaId" : "5990A44B-DD34-4B32-B233-9062902EBE9A"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:sonicwall:sma_210:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "51587338-4A5F-41FC-9497-743F061947C2"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sonicwall:sma_400_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "10.2.1.9-57sv" ,
"matchCriteriaId" : "C82E099E-AAE1-4BD3-B0C0-38326201586C"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:sonicwall:sma_400:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9D728332-10C9-4508-B720-569D44E99543"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sonicwall:sma_410_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "10.2.1.9-57sv" ,
"matchCriteriaId" : "E422E9C1-597B-468F-A634-23C54C1F7C74"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:sonicwall:sma_410:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9DFB8FBC-FFA4-4526-B306-D5692A43DC9E"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sonicwall:sma_500v_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "10.2.1.9-57sv" ,
"matchCriteriaId" : "B70F00FF-A14D-40F3-9381-817542DE6A7D"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:sonicwall:sma_500v:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A6AD8A33-7CE4-4C66-9E23-F0C9C9638770"
}
]
}
]
}
] ,
2023-12-05 23:00:21 +00:00
"references" : [
{
"url" : "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0018" ,
2023-12-13 17:08:24 +00:00
"source" : "PSIRT@sonicwall.com" ,
"tags" : [
"Vendor Advisory"
]
2023-12-05 23:00:21 +00:00
}
]
}