CVE-2023-34124
CRITICAL EXPLOITED NUCLEISonicWall GMS <9.3.2-SP1 & Analytics <2.5.0.4-R7 - Auth Bypass
Title source: llmDescription
The authentication mechanism in SonicWall GMS and Analytics Web Services had insufficient checks, allowing authentication bypass. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
Exploits (1)
metasploit
WORKING POC
EXCELLENT
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/sonicwall_shell_injection_cve_2023_34124.rb
Nuclei Templates (1)
SonicWall GMS and Analytics Web Services - Shell Injection
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan:
http.favicon.hash:-1381126564
FOFA:
icon_hash=-1381126564
Scores
CVSS v3
9.8
EPSS
0.9132
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2025-10-17
CWE
CWE-305
CWE-287
Status
published
Products (3)
sonicwall/analytics
< 2.5.0.4-r7
sonicwall/global_management_system
9.3.2 (2 CPE variants)
sonicwall/global_management_system
< 9.3.2
Published
Jul 13, 2023
Tracked Since
Feb 18, 2026