CVE-2023-34124

CRITICAL EXPLOITED NUCLEI

SonicWall GMS <9.3.2-SP1 & Analytics <2.5.0.4-R7 - Auth Bypass

Title source: llm

Description

The authentication mechanism in SonicWall GMS and Analytics Web Services had insufficient checks, allowing authentication bypass. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.

Exploits (1)

metasploit WORKING POC EXCELLENT
by fulmetalpackets <[email protected]>, Ron Bowes <[email protected]> · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/sonicwall_shell_injection_cve_2023_34124.rb

Nuclei Templates (1)

SonicWall GMS and Analytics Web Services - Shell Injection
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan: http.favicon.hash:-1381126564
FOFA: icon_hash=-1381126564

Scores

CVSS v3 9.8
EPSS 0.9132
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2025-10-17
CWE
CWE-305 CWE-287
Status published
Products (3)
sonicwall/analytics < 2.5.0.4-r7
sonicwall/global_management_system 9.3.2 (2 CPE variants)
sonicwall/global_management_system < 9.3.2
Published Jul 13, 2023
Tracked Since Feb 18, 2026