SonicWall GMS/Analytics TEA Hardcoded Key (pre-9.3.2-SP1, pre-2.5.0.4-R7)
CVE-2023-34130 Published on July 13, 2023

SonicWall GMS and Analytics use outdated Tiny Encryption Algorithm (TEA) with a hardcoded key to encrypt sensitive data. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.

Vendor Advisory NVD

Weakness Type

Use of a Broken or Risky Cryptographic Algorithm

The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information. The use of a non-standard algorithm is dangerous because a determined attacker may be able to break the algorithm and compromise whatever data has been protected. Well-known techniques may exist to break the algorithm.


Products Associated with CVE-2023-34130

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2023-34130 are published in these products:

 
 

Affected Versions

SonicWall GMS: SonicWall Analytics:

Exploit Probability

EPSS
0.11%
Percentile
29.55%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.