ID

VAR-201602-0122


CVE

CVE-2016-2396


TITLE

plural Dell SonicWALL Product GMS ViewPoint Web An arbitrary command execution vulnerability in the application

Trust: 0.8

sources: JVNDB: JVNDB-2016-001558

DESCRIPTION

The GMS ViewPoint (GMSVP) web application in Dell SonicWALL GMS, Analyzer, and UMA EM5000 7.2, 8.0, and 8.1 before Hotfix 168056 allows remote authenticated users to execute arbitrary commands via vectors related to configuration input. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. Authentication is required to exploit this vulnerability.The specific flaw exists within the GMS ViewPoint (GMSVP) web application. The issue lies in the handling of configuration input due to a failure to safely sanitize user data before executing a command. An attacker could leverage this vulnerability to execute code with root privileges on the underlying operating system. Dell SonicWALL GMS (Global Management System), Analyzer and UMA EM5000 are all products of Dell (Dell). GMS is a global management system for rapid deployment and centralized management of SonicWALL infrastructure. Analyzer is a set of network analyzer software for SonicWALL infrastructure. UMA EM5000 is a set of general management equipment software. The following products and versions are affected: Dell SonicWALL GMS, Analyzer, UMA EM5000 version 7.2, version 8.0, version 8.1 before Hotfix 168056

Trust: 2.43

sources: NVD: CVE-2016-2396 // JVNDB: JVNDB-2016-001558 // ZDI: ZDI-16-164 // VULHUB: VHN-91215 // VULMON: CVE-2016-2396

AFFECTED PRODUCTS

vendor:sonicwallmodel:uma em5000scope:eqversion:8.1

Trust: 1.6

vendor:sonicwallmodel:uma em5000scope:eqversion:8.0

Trust: 1.6

vendor:sonicwallmodel:global management systemscope:eqversion:8.1

Trust: 1.6

vendor:sonicwallmodel:analyzerscope:eqversion:8.1

Trust: 1.6

vendor:sonicwallmodel:global management systemscope:eqversion:8.0

Trust: 1.6

vendor:sonicwallmodel:uma em5000scope:eqversion:7.2

Trust: 1.6

vendor:sonicwallmodel:global management systemscope:eqversion:7.2

Trust: 1.6

vendor:sonicwallmodel:analyzerscope:eqversion:8.0

Trust: 1.6

vendor:sonicwallmodel:analyzerscope:eqversion:7.2

Trust: 1.6

vendor:dellmodel:sonicwall analyzerscope:eqversion:7.2

Trust: 0.8

vendor:dellmodel:sonicwall analyzerscope:eqversion:8.0

Trust: 0.8

vendor:dellmodel:sonicwall analyzerscope:eqversion:8.1

Trust: 0.8

vendor:dellmodel:sonicwall global management systemscope:eqversion:7.2

Trust: 0.8

vendor:dellmodel:sonicwall global management systemscope:eqversion:8.0

Trust: 0.8

vendor:dellmodel:sonicwall global management systemscope:eqversion:8.1

Trust: 0.8

vendor:dellmodel:sonicwall e-class universal management appliance em5000scope: - version: -

Trust: 0.8

vendor:dellmodel:sonicwall e-class universal management appliance em5000scope:eqversion:7.2

Trust: 0.8

vendor:dellmodel:sonicwall e-class universal management appliance em5000scope:eqversion:8.0

Trust: 0.8

vendor:dellmodel:sonicwall e-class universal management appliance em5000scope:eqversion:8.1

Trust: 0.8

vendor:sonicwallmodel:gms virtual appliancescope: - version: -

Trust: 0.7

sources: ZDI: ZDI-16-164 // JVNDB: JVNDB-2016-001558 // CNNVD: CNNVD-201602-322 // NVD: CVE-2016-2396

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-2396
value: CRITICAL

Trust: 1.0

NVD: CVE-2016-2396
value: HIGH

Trust: 0.8

ZDI: CVE-2016-2396
value: HIGH

Trust: 0.7

CNNVD: CNNVD-201602-322
value: CRITICAL

Trust: 0.6

VULHUB: VHN-91215
value: HIGH

Trust: 0.1

VULMON: CVE-2016-2396
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-2396
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.6

VULHUB: VHN-91215
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-2396
baseSeverity: CRITICAL
baseScore: 9.9
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.1
impactScore: 6.0
version: 3.0

Trust: 1.0

sources: ZDI: ZDI-16-164 // VULHUB: VHN-91215 // VULMON: CVE-2016-2396 // JVNDB: JVNDB-2016-001558 // CNNVD: CNNVD-201602-322 // NVD: CVE-2016-2396

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-91215 // JVNDB: JVNDB-2016-001558 // NVD: CVE-2016-2396

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201602-322

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201602-322

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-001558

PATCH

title:SonicWALL Analyzer Product Notificationurl:https://support.software.dell.com/product-notification/185943

Trust: 0.8

title:SonicWALL has issued an update to correct this vulnerability. Hotfix 168056url:https://www.mysonicwall.com/firmware/downloadcenter.aspx

Trust: 0.7

title:Multiple Dell Product Any Command Execution Vulnerability Fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60258

Trust: 0.6

sources: ZDI: ZDI-16-164 // JVNDB: JVNDB-2016-001558 // CNNVD: CNNVD-201602-322

EXTERNAL IDS

db:NVDid:CVE-2016-2396

Trust: 3.3

db:ZDIid:ZDI-16-164

Trust: 3.3

db:SECTRACKid:1035015

Trust: 1.2

db:JVNDBid:JVNDB-2016-001558

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-3037

Trust: 0.7

db:CNNVDid:CNNVD-201602-322

Trust: 0.7

db:VULHUBid:VHN-91215

Trust: 0.1

db:BIDid:83200

Trust: 0.1

db:VULMONid:CVE-2016-2396

Trust: 0.1

sources: ZDI: ZDI-16-164 // VULHUB: VHN-91215 // VULMON: CVE-2016-2396 // JVNDB: JVNDB-2016-001558 // CNNVD: CNNVD-201602-322 // NVD: CVE-2016-2396

REFERENCES

url:http://www.zerodayinitiative.com/advisories/zdi-16-164

Trust: 2.6

url:https://support.software.dell.com/product-notification/185943

Trust: 1.8

url:http://www.securitytracker.com/id/1035015

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2396

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-2396

Trust: 0.8

url:https://www.mysonicwall.com/firmware/downloadcenter.aspx

Trust: 0.7

url:https://cwe.mitre.org/data/definitions/77.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.securityfocus.com/bid/83200

Trust: 0.1

sources: ZDI: ZDI-16-164 // VULHUB: VHN-91215 // VULMON: CVE-2016-2396 // JVNDB: JVNDB-2016-001558 // CNNVD: CNNVD-201602-322 // NVD: CVE-2016-2396

CREDITS

kernelsmith - Zero Day Initiative

Trust: 0.7

sources: ZDI: ZDI-16-164

SOURCES

db:ZDIid:ZDI-16-164
db:VULHUBid:VHN-91215
db:VULMONid:CVE-2016-2396
db:JVNDBid:JVNDB-2016-001558
db:CNNVDid:CNNVD-201602-322
db:NVDid:CVE-2016-2396

LAST UPDATE DATE

2024-11-23T22:31:00.780000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-16-164date:2016-02-10T00:00:00
db:VULHUBid:VHN-91215date:2018-03-12T00:00:00
db:VULMONid:CVE-2016-2396date:2023-11-07T00:00:00
db:JVNDBid:JVNDB-2016-001558date:2016-03-03T00:00:00
db:CNNVDid:CNNVD-201602-322date:2016-02-18T00:00:00
db:NVDid:CVE-2016-2396date:2024-11-21T02:48:22.993

SOURCES RELEASE DATE

db:ZDIid:ZDI-16-164date:2016-02-10T00:00:00
db:VULHUBid:VHN-91215date:2016-02-17T00:00:00
db:VULMONid:CVE-2016-2396date:2016-02-17T00:00:00
db:JVNDBid:JVNDB-2016-001558date:2016-03-03T00:00:00
db:CNNVDid:CNNVD-201602-322date:2016-02-18T00:00:00
db:NVDid:CVE-2016-2396date:2016-02-17T15:59:06.737