Over 178,000 SonicWall firewalls uncovered over the web are exploitable to not less than one of many two safety flaws that may very well be doubtlessly exploited to trigger a denial-of-service (DoS) situation and distant code execution (RCE).
“The 2 points are basically the identical however exploitable at totally different HTTP URI paths because of reuse of a weak code sample,” Jon Williams, a senior safety engineer at Bishop Fox, mentioned in a technical evaluation shared with The Hacker Information.
The vulnerabilities in query are listed under –
- CVE-2022-22274 (CVSS rating: 9.4) – A stack-based buffer overflow vulnerability within the SonicOS by way of HTTP request permits a distant, unauthenticated attacker to trigger DoS or doubtlessly lead to code execution within the firewall.
- CVE-2023-0656 (CVSS rating: 7.5) – A stack-based buffer overflow vulnerability within the SonicOS permits a distant, unauthenticated attacker to trigger DoS, which may lead to a crash.
Whereas there are not any stories of exploitation of the failings within the wild, a proof-of-concept (PoC) for CVE-2023-0656 was printed by the SSD Safe Disclosure workforce April 2023.
The cybersecurity agency revealed that the problems may very well be weaponized by unhealthy actors to set off repeated crashes and drive the equipment to get into upkeep mode, requiring administrative motion to revive regular performance.
“Maybe most astonishing was the invention that over 146,000 publicly-accessible gadgets are weak to a bug that was printed virtually two years in the past,” Williams mentioned.
The event comes as watchTowr Labs uncovered a number of stack-based buffer overflow flaws within the SonicOS administration internet interface and SSL VPN portal that might result in a firewall crash.
To safeguard towards doable threats, it is really helpful to replace to the final model and make sure that the administration interface is not uncovered to the web.