SonicWall GMS/Analytics TEA Hardcoded Key (pre-9.3.2-SP1, pre-2.5.0.4-R7)
CVE-2023-34130 Published on July 13, 2023

SonicWall GMS and Analytics use outdated Tiny Encryption Algorithm (TEA) with a hardcoded key to encrypt sensitive data. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.

Vendor Advisory NVD

Weakness Type

Use of a Broken or Risky Cryptographic Algorithm

The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information. The use of a non-standard algorithm is dangerous because a determined attacker may be able to break the algorithm and compromise whatever data has been protected. Well-known techniques may exist to break the algorithm.


Products Associated with CVE-2023-34130

stack.watch emails you whenever new vulnerabilities are published in SonicWall Global Management System or SonicWall Analytics. Just hit a watch button to start following.

 
 

Affected Versions

SonicWall GMS: SonicWall Analytics:

Exploit Probability

EPSS
0.11%
Percentile
29.29%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.