Over 178,000 SonicWall firewalls uncovered over the web are exploitable to no less than one of many two safety flaws that might be doubtlessly exploited to trigger a denial-of-service (DoS) situation and distant code execution (RCE).
“The 2 points are basically the identical however exploitable at completely different HTTP URI paths attributable to reuse of a weak code sample,” Jon Williams, a senior safety engineer at Bishop Fox, stated in a technical evaluation shared with The Hacker Information.
The vulnerabilities in query are listed under –
- CVE-2022-22274 (CVSS rating: 9.4) – A stack-based buffer overflow vulnerability within the SonicOS by way of HTTP request permits a distant, unauthenticated attacker to trigger DoS or doubtlessly lead to code execution within the firewall.
- CVE-2023-0656 (CVSS rating: 7.5) – A stack-based buffer overflow vulnerability within the SonicOS permits a distant, unauthenticated attacker to trigger DoS, which may lead to a crash.
Whereas there are not any stories of exploitation of the failings within the wild, a proof-of-concept (PoC) for CVE-2023-0656 was printed by the SSD Safe Disclosure crew in April 2023.
The cybersecurity agency revealed that the problems might be weaponized by dangerous actors to set off repeated crashes and drive the equipment to get into upkeep mode, requiring administrative motion to revive regular performance.
“Maybe most astonishing was the invention that over 146,000 publicly-accessible units are weak to a bug that was printed nearly two years in the past,” Williams stated.
The event comes as watchTowr Labs uncovered a number of stack-based buffer overflow flaws within the SonicOS administration internet interface and SSL VPN portal that would result in a firewall crash.
To safeguard towards attainable threats, it is really useful to replace to the final model and make sure that the administration interface is not uncovered to the web.