var-201602-0122
Vulnerability from variot
The GMS ViewPoint (GMSVP) web application in Dell SonicWALL GMS, Analyzer, and UMA EM5000 7.2, 8.0, and 8.1 before Hotfix 168056 allows remote authenticated users to execute arbitrary commands via vectors related to configuration input. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. Authentication is required to exploit this vulnerability.The specific flaw exists within the GMS ViewPoint (GMSVP) web application. The issue lies in the handling of configuration input due to a failure to safely sanitize user data before executing a command. An attacker could leverage this vulnerability to execute code with root privileges on the underlying operating system. Dell SonicWALL GMS (Global Management System), Analyzer and UMA EM5000 are all products of Dell (Dell). GMS is a global management system for rapid deployment and centralized management of SonicWALL infrastructure. Analyzer is a set of network analyzer software for SonicWALL infrastructure. UMA EM5000 is a set of general management equipment software. The following products and versions are affected: Dell SonicWALL GMS, Analyzer, UMA EM5000 version 7.2, version 8.0, version 8.1 before Hotfix 168056
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "uma em5000", "scope": "eq", "trust": 1.6, "vendor": "sonicwall", "version": "8.1" }, { "_id": null, "model": "uma em5000", "scope": "eq", "trust": 1.6, "vendor": "sonicwall", "version": "8.0" }, { "_id": null, "model": "global management system", "scope": "eq", "trust": 1.6, "vendor": "sonicwall", "version": "8.1" }, { "_id": null, "model": "analyzer", "scope": "eq", "trust": 1.6, "vendor": "sonicwall", "version": "8.1" }, { "_id": null, "model": "global management system", "scope": "eq", "trust": 1.6, "vendor": "sonicwall", "version": "8.0" }, { "_id": null, "model": "uma em5000", "scope": "eq", "trust": 1.6, "vendor": "sonicwall", "version": "7.2" }, { "_id": null, "model": "global management system", "scope": "eq", "trust": 1.6, "vendor": "sonicwall", "version": "7.2" }, { "_id": null, "model": "analyzer", "scope": "eq", "trust": 1.6, "vendor": "sonicwall", "version": "8.0" }, { "_id": null, "model": "analyzer", "scope": "eq", "trust": 1.6, "vendor": "sonicwall", "version": "7.2" }, { "_id": null, "model": "sonicwall analyzer", "scope": "eq", "trust": 0.8, "vendor": "dell", "version": "7.2" }, { "_id": null, "model": "sonicwall analyzer", "scope": "eq", "trust": 0.8, "vendor": "dell", "version": "8.0" }, { "_id": null, "model": "sonicwall analyzer", "scope": "eq", "trust": 0.8, "vendor": "dell", "version": "8.1" }, { "_id": null, "model": "sonicwall global management system", "scope": "eq", "trust": 0.8, "vendor": "dell", "version": "7.2" }, { "_id": null, "model": "sonicwall global management system", "scope": "eq", "trust": 0.8, "vendor": "dell", "version": "8.0" }, { "_id": null, "model": "sonicwall global management system", "scope": "eq", "trust": 0.8, "vendor": "dell", "version": "8.1" }, { "_id": null, "model": "sonicwall e-class universal management appliance em5000", "scope": null, "trust": 0.8, "vendor": "dell", "version": null }, { "_id": null, "model": "sonicwall e-class universal management appliance em5000", "scope": "eq", "trust": 0.8, "vendor": "dell", "version": "7.2" }, { "_id": null, "model": "sonicwall e-class universal management appliance em5000", "scope": "eq", "trust": 0.8, "vendor": "dell", "version": "8.0" }, { "_id": null, "model": "sonicwall e-class universal management appliance em5000", "scope": "eq", "trust": 0.8, "vendor": "dell", "version": "8.1" }, { "_id": null, "model": "gms virtual appliance", "scope": null, "trust": 0.7, "vendor": "sonicwall", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-164" }, { "db": "JVNDB", "id": "JVNDB-2016-001558" }, { "db": "CNNVD", "id": "CNNVD-201602-322" }, { "db": "NVD", "id": "CVE-2016-2396" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:dell:sonicwall_analyzer", "vulnerable": true }, { "cpe22Uri": "cpe:/a:dell:sonicwall_global_management_system", "vulnerable": true }, { "cpe22Uri": "cpe:/h:dell:sonicwall_uma_em5000", "vulnerable": true }, { "cpe22Uri": "cpe:/o:dell:sonicwall_uma_em5000_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-001558" } ] }, "credits": { "_id": null, "data": "kernelsmith - Zero Day Initiative", "sources": [ { "db": "ZDI", "id": "ZDI-16-164" } ], "trust": 0.7 }, "cve": "CVE-2016-2396", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2016-2396", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 2.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-91215", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.1, "id": "CVE-2016-2396", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-2396", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2016-2396", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2016-2396", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201602-322", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-91215", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-2396", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-164" }, { "db": "VULHUB", "id": "VHN-91215" }, { "db": "VULMON", "id": "CVE-2016-2396" }, { "db": "JVNDB", "id": "JVNDB-2016-001558" }, { "db": "CNNVD", "id": "CNNVD-201602-322" }, { "db": "NVD", "id": "CVE-2016-2396" } ] }, "description": { "_id": null, "data": "The GMS ViewPoint (GMSVP) web application in Dell SonicWALL GMS, Analyzer, and UMA EM5000 7.2, 8.0, and 8.1 before Hotfix 168056 allows remote authenticated users to execute arbitrary commands via vectors related to configuration input. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. Authentication is required to exploit this vulnerability.The specific flaw exists within the GMS ViewPoint (GMSVP) web application. The issue lies in the handling of configuration input due to a failure to safely sanitize user data before executing a command. An attacker could leverage this vulnerability to execute code with root privileges on the underlying operating system. Dell SonicWALL GMS (Global Management System), Analyzer and UMA EM5000 are all products of Dell (Dell). GMS is a global management system for rapid deployment and centralized management of SonicWALL infrastructure. Analyzer is a set of network analyzer software for SonicWALL infrastructure. UMA EM5000 is a set of general management equipment software. The following products and versions are affected: Dell SonicWALL GMS, Analyzer, UMA EM5000 version 7.2, version 8.0, version 8.1 before Hotfix 168056", "sources": [ { "db": "NVD", "id": "CVE-2016-2396" }, { "db": "JVNDB", "id": "JVNDB-2016-001558" }, { "db": "ZDI", "id": "ZDI-16-164" }, { "db": "VULHUB", "id": "VHN-91215" }, { "db": "VULMON", "id": "CVE-2016-2396" } ], "trust": 2.43 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2016-2396", "trust": 3.3 }, { "db": "ZDI", "id": "ZDI-16-164", "trust": 3.3 }, { "db": "SECTRACK", "id": "1035015", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2016-001558", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-3037", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201602-322", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-91215", "trust": 0.1 }, { "db": "BID", "id": "83200", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-2396", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-164" }, { "db": "VULHUB", "id": "VHN-91215" }, { "db": "VULMON", "id": "CVE-2016-2396" }, { "db": "JVNDB", "id": "JVNDB-2016-001558" }, { "db": "CNNVD", "id": "CNNVD-201602-322" }, { "db": "NVD", "id": "CVE-2016-2396" } ] }, "id": "VAR-201602-0122", "iot": { "_id": null, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-91215" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:31:00.780000Z", "patch": { "_id": null, "data": [ { "title": "SonicWALL Analyzer Product Notification", "trust": 0.8, "url": "https://support.software.dell.com/product-notification/185943" }, { "title": "SonicWALL has issued an update to correct this vulnerability. Hotfix 168056", "trust": 0.7, "url": "https://www.mysonicwall.com/firmware/downloadcenter.aspx" }, { "title": "Multiple Dell Product Any Command Execution Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60258" } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-164" }, { "db": "JVNDB", "id": "JVNDB-2016-001558" }, { "db": "CNNVD", "id": "CNNVD-201602-322" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-77", "trust": 1.1 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-91215" }, { "db": "JVNDB", "id": "JVNDB-2016-001558" }, { "db": "NVD", "id": "CVE-2016-2396" } ] }, "references": { "_id": null, "data": [ { "trust": 2.6, "url": "http://www.zerodayinitiative.com/advisories/zdi-16-164" }, { "trust": 1.8, "url": "https://support.software.dell.com/product-notification/185943" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1035015" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2396" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-2396" }, { "trust": 0.7, "url": "https://www.mysonicwall.com/firmware/downloadcenter.aspx" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/77.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.securityfocus.com/bid/83200" } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-164" }, { "db": "VULHUB", "id": "VHN-91215" }, { "db": "VULMON", "id": "CVE-2016-2396" }, { "db": "JVNDB", "id": "JVNDB-2016-001558" }, { "db": "CNNVD", "id": "CNNVD-201602-322" }, { "db": "NVD", "id": "CVE-2016-2396" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-16-164", "ident": null }, { "db": "VULHUB", "id": "VHN-91215", "ident": null }, { "db": "VULMON", "id": "CVE-2016-2396", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2016-001558", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201602-322", "ident": null }, { "db": "NVD", "id": "CVE-2016-2396", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2016-02-10T00:00:00", "db": "ZDI", "id": "ZDI-16-164", "ident": null }, { "date": "2016-02-17T00:00:00", "db": "VULHUB", "id": "VHN-91215", "ident": null }, { "date": "2016-02-17T00:00:00", "db": "VULMON", "id": "CVE-2016-2396", "ident": null }, { "date": "2016-03-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-001558", "ident": null }, { "date": "2016-02-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201602-322", "ident": null }, { "date": "2016-02-17T15:59:06.737000", "db": "NVD", "id": "CVE-2016-2396", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2016-02-10T00:00:00", "db": "ZDI", "id": "ZDI-16-164", "ident": null }, { "date": "2018-03-12T00:00:00", "db": "VULHUB", "id": "VHN-91215", "ident": null }, { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2016-2396", "ident": null }, { "date": "2016-03-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-001558", "ident": null }, { "date": "2016-02-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201602-322", "ident": null }, { "date": "2024-11-21T02:48:22.993000", "db": "NVD", "id": "CVE-2016-2396", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201602-322" } ], "trust": 0.6 }, "title": { "_id": null, "data": "plural Dell SonicWALL Product GMS ViewPoint Web An arbitrary command execution vulnerability in the application", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-001558" } ], "trust": 0.8 }, "type": { "_id": null, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201602-322" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.