Thursday, June 19, 2025
HomeTechnologyOver 178,000 SonicWall Firewalls at Risk of DoS and RCE Vulnerabilities

Over 178,000 SonicWall Firewalls at Risk of DoS and RCE Vulnerabilities

Two unauthenticated denial-of-service (DoS) vulnerabilities are threatening the safety of
SonicWall
next-generation firewall gadgets, exposing greater than 178,000 of them to each
DoS
in addition to
distant code execution (RCE)
assaults.

“CVE-2022-22274 and CVE-2023-0656 characterize the identical vulnerability on totally different URI paths, a difficulty which is well exploited to crash susceptible gadgets,” he wrote.

High Potential for DoS Attacks on SonicWall Firewalls

Indeed, the potential influence of a widespread assault is “extreme,” he famous, as attackers can goal both or each bugs on susceptible firewalls to both crash the system or carry out RCE, disabling firewalls and doubtlessly permitting entry into company networks whereas knocking out VPN entry.

“In its default configuration, SonicOS restarts after a crash, however after three crashes in a brief time frame it boots into upkeep mode and requires administrative motion to revive regular performance,” Williams defined.

Fortunately for organizations that use the affected SonicWall gadgets, the newest out there firmware protects in opposition to each vulnerabilities, and an replace can mitigate the chance, Williams mentioned.

A Tale of Two Unauthenticated Flaws

Of the 2 bugs, CVE-2022-22274 — an unauthenticated buffer overflow affecting NGFW internet administration interfaces found in March 2022 — was rated as extra harmful, incomes a important score of 9.4 on the CVSS versus the 7.5 score of CVE-2023-0656 , which is ostensibly the identical sort of flaw and found a couple of 12 months later.

A distant, unauthenticated attacker may exploit the flaw through an HTTP request to trigger DoS or doubtlessly execute code within the firewall, in accordance
to a report
by Watchtower Labs on the vulnerability printed in October.

The researchers triggered CVE-2022-22274 by an HTTP request that wanted to fulfill two circumstances: the URI path have to be longer than 1024 bytes, and the HTTP model string have to be lengthy sufficient to trigger a stack canary overwrite.

They managed to realize a DoS assault in opposition to susceptible SonicWall sequence 6 and seven digital home equipment, even some patched variations. This is what led them to understand that whereas CVE-2022-22274 was patched on the firewalls, CVE-2023-0656 was not — and each flaws are attributable to the identical susceptible code sample in a special place, Williams mentioned.

“To our information, no earlier analysis has been printed establishing a hyperlink between CVE-2022-22274 and CVE-2023-0656,” he wrote within the put up. “Clearly, each vulnerabilities share the identical underlying bug, however the preliminary patch solely fastened the susceptible code in a single place, leaving the opposite cases to be discovered and reported a 12 months later.”

Patch & Protect Against SonicWall Cyberattacks

Hundreds of 1000’s of corporations throughout the globe use SonicWall merchandise, together with quite a few authorities companies and among the largest enterprises on this planet. Their widespread use makes them a lovely assault floor when gadgets grow to be susceptible; certainly, attackers have a historical past of pouncing
on SonicWall flaws
for
ransomware
and different assaults.

At this level the hazard shouldn’t be as a lot in a possible RCE assault as a DoS incident, given the out there exploit as a result of attackers would have just a few technical hurdles to beat — together with PIE, ASLR, and stack canaries, Williams famous.

“Perhaps a much bigger problem for an attacker is figuring out upfront what firmware and {hardware} variations a specific goal is utilizing, because the exploit have to be tailor-made to those parameters,” he added. “Since no approach is at the moment identified for remotely fingerprinting SonicWall firewalls, the probability of attackers leveraging RCE is, in our estimation, nonetheless low.”

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Popular