var-201602-0123
Vulnerability from variot

The cliserver implementation in Dell SonicWALL GMS, Analyzer, and UMA EM5000 7.2, 8.0, and 8.1 before Hotfix 168056 allows remote attackers to deserialize and execute arbitrary Java code via crafted XML data. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. An attacker can leverage this vulnerability to execute arbitrary code under the context of root. Multiple Dell SonicWALL Products are prone to a remote code-execution vulnerability. Successful exploitation can completely compromise the vulnerable device. The following products are vulnerable: Dell SonicWALL Global Management System Dell SonicWALL Analyzer Dell SonicWALL Universal Managemnet Appliance NOTE: This BID is being retired as it is a duplicate of BID 83200 (Multiple Dell SonicWALL Products Multiple Remote Code Execution Vulnerabilities). GMS is a global management system for rapid deployment and centralized management of SonicWALL infrastructure. Analyzer is a set of network analyzer software for SonicWALL infrastructure. UMA EM5000 is a set of general management equipment software

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "uma em5000",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sonicwall",
        "version": "8.1"
      },
      {
        "_id": null,
        "model": "uma em5000",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sonicwall",
        "version": "8.0"
      },
      {
        "_id": null,
        "model": "global management system",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sonicwall",
        "version": "8.1"
      },
      {
        "_id": null,
        "model": "analyzer",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sonicwall",
        "version": "8.1"
      },
      {
        "_id": null,
        "model": "global management system",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sonicwall",
        "version": "8.0"
      },
      {
        "_id": null,
        "model": "uma em5000",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sonicwall",
        "version": "7.2"
      },
      {
        "_id": null,
        "model": "global management system",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sonicwall",
        "version": "7.2"
      },
      {
        "_id": null,
        "model": "analyzer",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sonicwall",
        "version": "8.0"
      },
      {
        "_id": null,
        "model": "analyzer",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sonicwall",
        "version": "7.2"
      },
      {
        "_id": null,
        "model": "sonicwall global management system",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "dell",
        "version": "8.0"
      },
      {
        "_id": null,
        "model": "sonicwall global management system",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "dell",
        "version": "7.2"
      },
      {
        "_id": null,
        "model": "sonicwall analyzer",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "dell",
        "version": "8.0"
      },
      {
        "_id": null,
        "model": "sonicwall analyzer",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "dell",
        "version": "7.2"
      },
      {
        "_id": null,
        "model": "sonicwall global management system",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "dell",
        "version": "8.1 hotfix 168056"
      },
      {
        "_id": null,
        "model": "sonicwall analyzer",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "dell",
        "version": "8.1 hotfix 168056"
      },
      {
        "_id": null,
        "model": "sonicwall global management system",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "dell",
        "version": "8.1"
      },
      {
        "_id": null,
        "model": "sonicwall e-class universal management appliance em5000",
        "scope": null,
        "trust": 0.8,
        "vendor": "dell",
        "version": null
      },
      {
        "_id": null,
        "model": "sonicwall analyzer",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "dell",
        "version": "8.1"
      },
      {
        "_id": null,
        "model": "sonicwall e-class universal management appliance em5000",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "dell",
        "version": "7.2"
      },
      {
        "_id": null,
        "model": "sonicwall e-class universal management appliance em5000",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "dell",
        "version": "8.1 hotfix 168056"
      },
      {
        "_id": null,
        "model": "sonicwall e-class universal management appliance em5000",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "dell",
        "version": "8.1"
      },
      {
        "_id": null,
        "model": "sonicwall e-class universal management appliance em5000",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "dell",
        "version": "8.0"
      },
      {
        "_id": null,
        "model": "gms virtual appliance",
        "scope": null,
        "trust": 0.7,
        "vendor": "sonicwall",
        "version": null
      },
      {
        "_id": null,
        "model": "sonicwall universal management appliance em5000",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "dell",
        "version": "8.1"
      },
      {
        "_id": null,
        "model": "sonicwall universal management appliance em5000",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "dell",
        "version": "8.0"
      },
      {
        "_id": null,
        "model": "sonicwall universal management appliance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "dell",
        "version": "7.2"
      },
      {
        "_id": null,
        "model": "sonicwall global management system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "dell",
        "version": "8.1"
      },
      {
        "_id": null,
        "model": "sonicwall analyzer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "dell",
        "version": "8.1"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-16-163"
      },
      {
        "db": "BID",
        "id": "84882"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001704"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-323"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2397"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:dell:sonicwall_analyzer",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:dell:sonicwall_global_management_system",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:dell:sonicwall_uma_em5000",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dell:sonicwall_uma_em5000_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001704"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "cpnrodzc7",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-16-163"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2016-2397",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2016-2397",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 2.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-91216",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2016-2397",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-2397",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2016-2397",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "ZDI",
            "id": "CVE-2016-2397",
            "trust": 0.7,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201602-323",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-91216",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2016-2397",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-16-163"
      },
      {
        "db": "VULHUB",
        "id": "VHN-91216"
      },
      {
        "db": "VULMON",
        "id": "CVE-2016-2397"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001704"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-323"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2397"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "The cliserver implementation in Dell SonicWALL GMS, Analyzer, and UMA EM5000 7.2, 8.0, and 8.1 before Hotfix 168056 allows remote attackers to deserialize and execute arbitrary Java code via crafted XML data. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified.  An attacker can leverage this vulnerability to execute arbitrary code under the context of root. Multiple Dell SonicWALL Products are prone to a remote code-execution vulnerability. Successful exploitation can completely compromise the vulnerable device. \nThe following products are vulnerable:\nDell SonicWALL Global Management System\nDell SonicWALL Analyzer\nDell SonicWALL Universal Managemnet Appliance\nNOTE: This BID is being retired as it is a duplicate of BID 83200 (Multiple Dell SonicWALL Products Multiple Remote Code Execution Vulnerabilities). GMS is a global management system for rapid deployment and centralized management of SonicWALL infrastructure. Analyzer is a set of network analyzer software for SonicWALL infrastructure. UMA EM5000 is a set of general management equipment software",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-2397"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001704"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-163"
      },
      {
        "db": "BID",
        "id": "84882"
      },
      {
        "db": "VULHUB",
        "id": "VHN-91216"
      },
      {
        "db": "VULMON",
        "id": "CVE-2016-2397"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-16-163",
        "trust": 3.6
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2397",
        "trust": 3.3
      },
      {
        "db": "SECTRACK",
        "id": "1035015",
        "trust": 1.2
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001704",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3137",
        "trust": 0.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-323",
        "trust": 0.7
      },
      {
        "db": "BID",
        "id": "84882",
        "trust": 0.3
      },
      {
        "db": "VULHUB",
        "id": "VHN-91216",
        "trust": 0.1
      },
      {
        "db": "BID",
        "id": "83200",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2016-2397",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-16-163"
      },
      {
        "db": "VULHUB",
        "id": "VHN-91216"
      },
      {
        "db": "VULMON",
        "id": "CVE-2016-2397"
      },
      {
        "db": "BID",
        "id": "84882"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001704"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-323"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2397"
      }
    ]
  },
  "id": "VAR-201602-0123",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-91216"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T22:31:00.741000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "SonicWALL Analyzer Product Notification",
        "trust": 0.8,
        "url": "https://support.software.dell.com/ja-jp/product-notification/185943"
      },
      {
        "title": "SonicWALL has issued an update to correct this vulnerability.        Hotfix 168056",
        "trust": 0.7,
        "url": "https://www.mysonicwall.com/firmware/downloadcenter.aspx"
      },
      {
        "title": "Multiple Dell Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60259"
      },
      {
        "title": "Java-Deserialization-CVEs",
        "trust": 0.1,
        "url": "https://github.com/PalindromeLabs/Java-Deserialization-CVEs "
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-16-163"
      },
      {
        "db": "VULMON",
        "id": "CVE-2016-2397"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001704"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-323"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-77",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-91216"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001704"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2397"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 2.1,
        "url": "https://support.software.dell.com/product-notification/185943"
      },
      {
        "trust": 1.8,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-163"
      },
      {
        "trust": 1.2,
        "url": "http://www.securitytracker.com/id/1035015"
      },
      {
        "trust": 1.1,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-163/"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2397"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-2397"
      },
      {
        "trust": 0.7,
        "url": "https://www.mysonicwall.com/firmware/downloadcenter.aspx"
      },
      {
        "trust": 0.3,
        "url": "http://www.sonicwall.com/us/en/products/gms-series.html"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/77.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.securityfocus.com/bid/83200"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/palindromelabs/java-deserialization-cves"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-16-163"
      },
      {
        "db": "VULHUB",
        "id": "VHN-91216"
      },
      {
        "db": "VULMON",
        "id": "CVE-2016-2397"
      },
      {
        "db": "BID",
        "id": "84882"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001704"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-323"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2397"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-16-163",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-91216",
        "ident": null
      },
      {
        "db": "VULMON",
        "id": "CVE-2016-2397",
        "ident": null
      },
      {
        "db": "BID",
        "id": "84882",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001704",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-323",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2397",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2016-02-10T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-163",
        "ident": null
      },
      {
        "date": "2016-02-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-91216",
        "ident": null
      },
      {
        "date": "2016-02-17T00:00:00",
        "db": "VULMON",
        "id": "CVE-2016-2397",
        "ident": null
      },
      {
        "date": "2016-02-17T00:00:00",
        "db": "BID",
        "id": "84882",
        "ident": null
      },
      {
        "date": "2016-03-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-001704",
        "ident": null
      },
      {
        "date": "2016-02-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201602-323",
        "ident": null
      },
      {
        "date": "2016-02-17T15:59:07.690000",
        "db": "NVD",
        "id": "CVE-2016-2397",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2016-02-10T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-163",
        "ident": null
      },
      {
        "date": "2018-03-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-91216",
        "ident": null
      },
      {
        "date": "2018-03-12T00:00:00",
        "db": "VULMON",
        "id": "CVE-2016-2397",
        "ident": null
      },
      {
        "date": "2016-09-01T17:00:00",
        "db": "BID",
        "id": "84882",
        "ident": null
      },
      {
        "date": "2016-03-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-001704",
        "ident": null
      },
      {
        "date": "2016-02-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201602-323",
        "ident": null
      },
      {
        "date": "2024-11-21T02:48:23.100000",
        "db": "NVD",
        "id": "CVE-2016-2397",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-323"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "plural  Dell SonicWALL Product  cliserver Implementation of deserialization vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001704"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-323"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…