Initiatives pour
En tant qu'autorité nationale en matière de cybersécurité, le CCB a développé plusieurs initiatives destinées à des publics spécifiques, qui sont présentées ici.
Reference:
Advisory #2023-24
Version:
1.0
Affected software:
SonicWall FireWalls 7.0.1-5095 and earlier
SonicWall NSsp Firewall 7.0.1-5083 and earlier
SonicWall NSv Firewalls 6.5.4.4-44v-21-1551 and earlier
Type:
Unauthenticated stack-based buffer overflow
CVE/CVSS:
CVE: CVE-2023-0656
CVSS: 7.5
Security Advisory (sonicwall.com)
NVD - CVE-2023-0656 (nist.gov)
Successful exploitation of CVE-2023-0656 can allow an unauthenticated attacker to cause a Denial-of-Service (DoS) attack and crash impacted firewalls.
A stack-based buffer overflow vulnerability in the SonicOS software can lead to a DoS attack. This impacts only the web management interface. The SonicOS SSLVPN interface is not affected. The vendor has provided a table with the products and the specific impacted platforms and versions affected.
As of this moment there are no known proof-of-concept (PoC) and exploitation attempts, but the publication of the vulnerability is recent.
The CCB recommends following actions depending on the product: