Vulnerability Details : CVE-2023-44221
Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user, potentially leading to OS Command Injection Vulnerability.
Products affected by CVE-2023-44221
- cpe:2.3:o:sonicwall:sma_200_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:sonicwall:sma_210_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:sonicwall:sma_400_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:sonicwall:sma_410_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:sonicwall:sma_500v_firmware:*:*:*:*:*:*:*:*
CVE-2023-44221 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
SonicWall SMA100 Appliances OS Command Injection Vulnerability
CISA required action:
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
CISA description:
SonicWall SMA100 appliances contain an OS command injection vulnerability in the SSL-VPN management interface that allows a remote, authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user.
Notes:
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0018 ; https://nvd.nist.gov/vuln/detail/CVE-2023-44221
Added on
2025-05-01
Action due date
2025-05-22
Exploit prediction scoring system (EPSS) score for CVE-2023-44221
43.43%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-44221
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-04-30 |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
NIST |
CWE ids for CVE-2023-44221
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by:
- nvd@nist.gov (Primary)
- PSIRT@sonicwall.com (Secondary)
References for CVE-2023-44221
-
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0018
Security AdvisoryVendor Advisory
Jump to