CVE-2023-44221
Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- September 26, 2023
- Published Date
- December 05, 2023
- Last Updated
- December 02, 2024
- Vendor
- SonicWall
- Product
- SMA100
- Description
- Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user, potentially leading to OS Command Injection Vulnerability.
- Tags
- Score
- 46.25% (Percentile: 97.48%) as of 2025-05-30
- Exploitation
- none
- Technical Impact
- total
- Exploited in the Wild
- Yes (2025-05-01 00:00:00 UTC) Source
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score
SSVC Information
Exploit Status
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
TheHackerNews | 2025-05-01 09:06:31 UTC |
Recent Mentions
SonicBoom, From Stolen Tokens to Remote Shells - SonicWall SMA100 (CVE-2023-44221, CVE-2024-38475)
Source: Watchtower Labs • Published: 2025-05-01 22:31:04 UTC
SonicBoom, From Stolen Tokens to Remote Shells - SonicWall SMA (CVE-2023-44221, CVE-2024-38475)
Source: Watchtower Labs • Published: 2025-05-01 22:31:04 UTC
CISA Adds Two Known Exploited Vulnerabilities to Catalog
Source: All CISA Advisories • Published: 2025-05-01 12:00:00 UTC
SonicWall Confirms Active Exploitation of Flaws Affecting Multiple Appliance Models
Source: TheHackerNews • Published: 2025-05-01 06:22:00 UTC
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Added to KEVIntel