SonicWall SonicOS default account | CVE-2023-41713

NAME
__________
SonicWall SonicOS default account

Platforms Affected:
SonicWall TZ370 7.0.1-5119
SonicWall TZ370W 7.0.1-5119
SonicWall TZ470 7.0.1-5119
SonicWall TZ470W 7.0.1-5119
SonicWall TZ570 7.0.1-5119
SonicWall TZ570P 7.0.1-5119
SonicWall TZ670 7.0.1-5119
SonicWall NSa 2700 7.0.1-5119
SonicWall NSa 3700 7.0.1-5119
SonicWall NSa 4700 7.0.1-5119
SonicWall NSa 5700 7.0.1-5119
SonicWall NSa 6700 7.0.1-5119
SonicWall NSsp 10700 7.0.1-5119
SonicWall NSsp 11700 7.0.1-5119
SonicWall NSsp 13700 7.0.1-5119
SonicWall NSv 270 7.0.1-5119
SonicWall NSv 470 7.0.1-5119
SonicWall NSv 870 7.0.1-5119

Risk Level:
5.3

Exploitability:
Unproven

Consequences:
Gain Access

DESCRIPTION
__________

SonicWall SonicOS contains default hardcoded credentials in ‘dynHandleBuyToolbar’ demo function. A remote attacker could exploit this vulnerability to gain access to the system.

CVSS 3.0 Information
__________

Privileges Required:
None

User Interaction:
None

Scope:
Unchanged

Access Vector:
Network



A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

 To keep up to date follow us on the below channels.