{"id":280224,"date":"2023-04-27T11:16:33","date_gmt":"2023-04-27T09:16:33","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=280224"},"modified":"2023-06-04T22:50:37","modified_gmt":"2023-06-04T20:50:37","slug":"sonicos-sslvpn-schwachstelle-cve-2023-1101-bei-mfa-neue-firmware-fr-gen6-firewalls-6-5-4-12-101n","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2023\/04\/27\/sonicos-sslvpn-schwachstelle-cve-2023-1101-bei-mfa-neue-firmware-fr-gen6-firewalls-6-5-4-12-101n\/","title":{"rendered":"SonicOS SSLVPN: Schwachstelle CVE-2023-1101 bei MFA &#8211; neue Firmware f&uuml;r Gen6-Firewalls (6.5.4.12-101n)"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/borncity.com\/win\/2023\/04\/28\/sonicos-sslvpn-cve-2023-1101-at-mfa-new-firmware-for-gen6-firewalls-6-5-4-12-101n\/\" target=\"_blank\" rel=\"noopener\">English<\/a>]Kleine Erinnerung f\u00fcr Administratoren, die Produkte von Sonic Wall verwenden. In SonicOS SSLVPN gibt es eine kritische Schwachstelle, die einem authentifizierten Angreifer erm\u00f6glicht, exzessive MFA-Codes zu verwenden. Die Schwachstelle CVE-2023-1101 hat von SonicWall am 28. M\u00e4rz 2023 den CVSS v3-Index von 4.3 erhalten (siehe <a href=\"https:\/\/web.archive.org\/web\/20230521185100\/https:\/\/psirt.global.sonicwall.com\/vuln-detail\/SNWLID-2023-0005\" target=\"_blank\" rel=\"noopener\">diesen Beitrag<\/a>). Blog-Leser C.J. hat mich in einer Mail darauf hingewiesen, dass es eine neue Firmware f\u00fcr Gen6 &#8211; 6.5.4.12-101n gebe.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg09.met.vgwort.de\/na\/30aab1bbd18041a586da5530690f5f2c\" alt=\"\" width=\"1\" height=\"1\" \/>Blog-Leser C.J. schrieb in seiner Mail \"Sonicwall Firewalls neue Firmware f\u00fcr Gen6 &#8211; 6.5.4.12-101n\" folgendes (danke f\u00fcr die Information):<\/p>\n<blockquote><p>Hallo G\u00fcnter,<\/p>\n<p>falls es f\u00fcr Deinen Blog interessant ist:<\/p>\n<p>Sonicwall hat heute offiziell eine neue Firmware f\u00fcr Gen6-Firewalls herausgegeben. Mehr Infos habe ich nicht gefunden als das PDF im Anhang &#8211; und folgende <a href=\"https:\/\/www.opencve.io\/cve\/CVE-2023-1101\" target=\"_blank\" rel=\"noopener\">CVE-2023-1101<\/a>.<\/p><\/blockquote>\n<p>Dort wird <a href=\"https:\/\/www.opencve.io\/cve\/CVE-2023-1101\" target=\"_blank\" rel=\"noopener\">CVE-2023-1101<\/a> mit einem CVSS v3.0-Index von 8.8 aufgelistet (siehe nachfolgendes Bild). Der SonicWall-Beitrag hier <a href=\"https:\/\/web.archive.org\/web\/20230521185100\/https:\/\/psirt.global.sonicwall.com\/vuln-detail\/SNWLID-2023-0005\" target=\"_blank\" rel=\"noopener\">listet<\/a> die betroffenen Produkte sowie die betroffenen und die gefixten Versionen der Software auf.<\/p>\n<p>Heise hatte bereits im M\u00e4rz 2023 in diesem Beitrag \u00fcber <a href=\"https:\/\/www.heise.de\/news\/Sonicwall-SonicOS-Angreifer-aus-dem-Netz-koennen-Firewall-lahmlegen-7536077.html\" target=\"_blank\" rel=\"noopener\">diese Schwachstelle<\/a> berichtet. Das von C. J. per Mail geschickte PDF-Dokument beschreibt\u00a0 SonicOS 6.5.4.12, welches im April 2023 ver\u00f6ffentlicht wurde. Ich hiehe mal die wesentlichen Informationen aus der Release Note heraus.<\/p>\n<blockquote><p>SonicWall SonicOS 6.5.4.12 resolved key issues, which were found since the previous release. For more<br \/>\ninformation, refer to the Resolved Issues section.<\/p>\n<p>This release supports all the features and contains all the resolved issues found in previous SonicOS 6.5 releases.<\/p>\n<p>SonicOS 6.5.4.12 is supported on the following SonicWall appliances:<\/p>\n<p>\u2022 NSa 9650\u00a0 \u2022 SuperMassive 9600\u00a0 \u2022 TZ600 \/ TZ600P<br \/>\n\u2022 NSa 9450\u00a0 \u2022 SuperMassive 9400\u00a0 \u2022 TZ500 \/ TZ500 Wireless<br \/>\n\u2022 NSa 9250\u00a0 \u2022 SuperMassive 9200\u00a0 \u2022 TZ400 \/ TZ400 Wireless<br \/>\n\u2022 NSa 6650\u00a0 \u2022 NSA 6600\u00a0 \u2022 TZ350 \/ TZ350 Wireless<br \/>\n\u2022 NSa 5650\u00a0 \u2022 NSA 5600\u00a0 \u2022 TZ300 \/ TZ300P \/ TZ300 Wireless<br \/>\n\u2022 NSa 4650\u00a0 \u2022 NSA 4600\u00a0 \u2022 SOHO 250 \/ SOHO 250 Wireless<br \/>\n\u2022 NSa 3650\u00a0 \u2022 NSA 3600\u00a0 \u2022 SOHO Wireless<br \/>\n\u2022 NSa 2650\u00a0 \u2022 NSA 2600<\/p>\n<p>Resolved issues in this release.<\/p>\n<p>Refer to SonicOS SSLVPN Improper Restriction of Excessive MFA Attempts Vulnerability. <a href=\"https:\/\/web.archive.org\/web\/20230521185100\/https:\/\/psirt.global.sonicwall.com\/vuln-detail\/SNWLID-2023-0005\" target=\"_blank\" rel=\"noopener\">GEN6-3862<\/a><br \/>\nRefer to Impact of OpenSSL Vulnerabilities Advisory Released on February 7, 2023. <a href=\"https:\/\/psirt.global.sonicwall.com\/vuln-detail\/SNWLID-2023-0003\" target=\"_blank\" rel=\"noopener\">GEN6-3850<\/a><br \/>\nRefer to Impact of OpenSSL Vulnerabilities Advisory Released on February 7, 2023. <a href=\"https:\/\/psirt.global.sonicwall.com\/vuln-detail\/SNWLID-2023-0003\" target=\"_blank\" rel=\"noopener\">GEN6-3849<\/a><br \/>\nDownloading signatures via proxy server when enabled was causing the download to occur only<br \/>\nthrough HTTP even for DEAG.<br \/>\nGEN6-3776<br \/>\nUnder certain conditions, an incorrect interface number could be internally used by SonicOS<br \/>\nwhich may result in a restart being triggered while reporting a related event over Syslog.<br \/>\nGEN6-3619<br \/>\nIn a rare race condition, SonicOS may encounter an error and restart while displaying the current<br \/>\nconfiguration in the CLI.<br \/>\nGEN6-3560<br \/>\nSonicOS error page content is spoofing a vulnerability. GEN6-3528<br \/>\nIn a corner case, NSM synchronization may sometimes trigger a SonicOS reboot. GEN6-3388<br \/>\nWhen using IE11, GUI pages for Firewall &gt; Access Rules and Firewall &gt; App Rules do not show<br \/>\nany content.<br \/>\nGEN6-3375<br \/>\nRADIUS authentication fails when configured to operate in \"Forced MSCHAPv2 mode\". GEN6-3354<br \/>\nScheduled backup to FTP server is not working correctly when long directory paths are<br \/>\nconfigured.<br \/>\nGEN6-3142<\/p>\n<p>Known issues in this release.<\/p>\n<p>VPN management access rule still exists when \"Disable auto-added VPN management rules\" is<br \/>\nenabled.<br \/>\nGEN6-2567<br \/>\nThe VLAN ID, when edited for a trunked port, reverts to the default setting after restarting the<br \/>\nfirewall or importing the settings.<br \/>\nGEN6-2557<br \/>\nUnder certain conditions SSLVPN IP leases cannot be released and may result in the IP pool being<br \/>\nexhausted. Logging out the users using the user status page will free up the IP addresses.<br \/>\nGEN6-2333<br \/>\nAn established IPSEC VPN tunnel intermittently fails in a NAT environment. GEN6-2296<br \/>\n10G interface goes down after configuring it as a dedicated uplink for a Sonicwall Switch due to<br \/>\nnegotiation issue.<br \/>\nWorkaround: Login to switch console and enable auto negotiation on the interface which went<br \/>\ndown.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>[English]Kleine Erinnerung f\u00fcr Administratoren, die Produkte von Sonic Wall verwenden. In SonicOS SSLVPN gibt es eine kritische Schwachstelle, die einem authentifizierten Angreifer erm\u00f6glicht, exzessive MFA-Codes zu verwenden. Die Schwachstelle CVE-2023-1101 hat von SonicWall am 28. M\u00e4rz 2023 den CVSS v3-Index &hellip; <a href=\"https:\/\/borncity.com\/blog\/2023\/04\/27\/sonicos-sslvpn-schwachstelle-cve-2023-1101-bei-mfa-neue-firmware-fr-gen6-firewalls-6-5-4-12-101n\/\">Weiterlesen <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426,7459],"tags":[4328,3836],"class_list":["post-280224","post","type-post","status-publish","format-standard","hentry","category-sicherheit","category-software","tag-sicherheit","tag-software"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/280224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=280224"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/280224\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=280224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=280224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=280224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}