CVE-2023-34129
high-risk
Published 2023-07-13
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in SonicWall GMS and Analytics allows an authenticated remote attacker to traverse the directory and extract arbitrary files using Zip Slip method to any location on the underlying filesystem with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
Do I need to act?
!
30.1% chance of exploitation in next 30 days
EPSS score — higher than 70% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (4)
Affected Vendors
References (4)
Vendor Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010
Vendor Advisory
https://www.sonicwall.com/support/notices/230710150218060
Vendor Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010
Vendor Advisory
https://www.sonicwall.com/support/notices/230710150218060
55
/ 100
high-risk
Severity
30/34 · Critical
Exploitability
15/34 · Moderate
Exposure
10/34 · Low