Advisory Details

January 9th, 2025

SonicWALL NSv setSshdConfig Exposed Dangerous Function Local Privilege Escalation Vulnerability

ZDI-25-014
ZDI-CAN-24821

CVE ID CVE-2024-53706
CVSS SCORE 7.8, AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS SonicWALL
AFFECTED PRODUCTS NSv
VULNERABILITY DETAILS

This vulnerability allows local attackers to escalate privileges on affected installations of SonicWALL NSv. An attacker must first obtain the ability to execute low-privileged code on the target system or send a TCP packet to a local service in order to exploit this vulnerability.

The specific flaw exists within the setSshdConfig command. The issue results from an exposed dangerous function. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.

ADDITIONAL DETAILS SonicWALL has issued an update to correct this vulnerability. More details can be found at:
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003
DISCLOSURE TIMELINE
  • 2024-11-05 - Vulnerability reported to vendor
  • 2025-01-09 - Coordinated public release of advisory
  • 2025-01-09 - Advisory Updated
CREDIT Daan Keuper, Thijs Alkemade and Khaled Nassar of Computest Security
BACK TO ADVISORIES