SonicWall SMA100 Appliances OS Command Injection Vulnerability (CVE-2023-44221)
SonicWall SMA100 appliances contain an OS command injection vulnerability in the SSL-VPN management interface that allows a remote, authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user.
A remote attacker, with administrative privileges, can achieve full data confidentiality loss, arbitrary modification of data, complete denial of service or system unavailability. Federal agencies are required to remediate by 2025-05-22 under CISA BOD 22-01.
This is a OS Command Injection (CWE-78) vulnerability in SonicWall SMA100 Appliances. Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user, potentially leading to OS Command Injection Vulnerability. Exploitation requires remote network access, low attack complexity, an administrative account, and no user interaction required.
Probably yes if any of these apply:
CISA added this CVE to the Known Exploited Vulnerabilities catalog on 2025-05-01 based on evidence of active exploitation in the wild. Federal agencies required to remediate by 2025-05-22.
Manual remediation steps
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.