CVE-2023-44221
Published on December 5, 2023

Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user, potentially leading to OS Command Injection Vulnerability.

Vendor Advisory Vendor Advisory NVD

Known Exploited Vulnerability

This SonicWall SMA100 Appliances OS Command Injection Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. SonicWall SMA100 appliances contain an OS command injection vulnerability in the SSL-VPN management interface that allows a remote, authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user.

The following remediation steps are recommended / required by May 22, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Vulnerability Analysis

CVE-2023-44221 can be exploited with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 1.2 out of four. The potential impact of an exploit of this vulnerability is considered to be very high.

What is a Shell injection Vulnerability?

The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

CVE-2023-44221 has been classified to as a Shell injection vulnerability or weakness.


Products Associated with CVE-2023-44221

You can be notified by stack.watch whenever vulnerabilities like CVE-2023-44221 are published in these products:

What versions are vulnerable to CVE-2023-44221?

Each of the following must match for the vulnerability to exist.

Each of the following must match for the vulnerability to exist.

Each of the following must match for the vulnerability to exist.

Each of the following must match for the vulnerability to exist.

Each of the following must match for the vulnerability to exist.