Hey you,
BE IN THE KNOW!

35,000 ransomware infections per month and you still believe you are protected?

Sign up to receive:

  • alerts
  • news
  • free how-to-remove guides

of the newest online threats - directly to your inbox:


Dell SonicWALL Email Security Platform Flaws Could Cause Sensitive Information Disclosure

vulnerability-stforum

Four previously unknown vulnerabilities were found in the Dell SonicWALL Email Security virtual appliance app by researchers at Digital Defense Inc. The researchers detected the flaws while developing new audit modules for its patented vulnerability scanning technology. The flaws should be addressed immediately because of the easily accessible web interface on internet or intranet-connected application for the app. Furthermore, there’s a potential for unauthorized individuals to access sensitive information.

The Dell SonicWALL Email Security platform can be configured as a Mail Transfer Agent (MTA) or SMTP proxy and with spam protection, compliance scanning, anti-malware and anti-virus capabilities.

What’s the Impact of the Flaws in Dell SonicWALL Email Security platform?

If these vulnerabilities end up being exploited in the wild, worst case scenario is sensitive data disclosure of admin account password hash, arbitrary OS command execution and file deletion as ROOT. Eventually, the scenario would end with complete compromise of the appliance.

Related: Dell Tech Support Scams Point at a Major Customer Data Breach

Fortunately, Dell has already addressed the vulnerabilities in a rollup patch 8.3.2 for the SonicWALL Email Security platform. The patch has been available to customers since October 3, 2016.

Here is a short resume of all four vulnerabilities:

  • Authentication Bypass in DLoadReportsServlet
  • Impact: Sensitive information disclosure including config files and the SHA1 password hash for the admin account.

  • Authenticated XML External Entity Injection in known_network_data_import.html
  • Impact: Information disclosure.

  • Authenticated Remote Command Execution in manage_ftpprofile.html
  • Impact: Arbitrary OS command execution as root, full compromise of the virtual appliance.

  • Authenticated Arbitrary File Deletion in policy_dictionary.html
  • Impact: Deletion of arbitrary files with root privileges, denial of service.

    Milena Dimitrova

    An inspired writer, focused on user privacy and malicious software. Enjoys 'Mr. Robot' and fears '1984'.

    More Posts - Website

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.