Overview
SonicWall SMA100 appliances contain an OS command injection vulnerability in the SSL-VPN management interface that allows a remote, authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user.
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0018 ; https://nvd.nist.gov/vuln/detail/CVE-2023-44221
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2023-44221 |
| Vendor / Product | SonicWall — SMA100 Appliances |
| NVD Published | 2023-12-05 |
| NVD Last Modified | 2025-10-31 |
| CVSS 3.1 Score | 7.2 |
| CVSS 3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| Severity | HIGH |
| CWE | CWE-78 |
| CISA KEV Added | 2025-05-01 |
| CISA KEV Deadline | 2025-05-22 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Required Action
CISA BOD 22-01 Deadline: 2025-05-22.
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Timeline
| Date | Event |
|---|---|
| 2025-05-01 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2025-05-22 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2023-44221 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |