SonicWall SonicOS Security Misconfiguration (SNWLID-2023-0005)

high Nessus Plugin ID 172440


The remote host is affected by a security misconfiguration vulnerability.


According to its self-reported version, the remote SonicWall firewall is running a version of SonicOS that is affected by a security misconfiguration vulnerability, due to improper restriction of excessive MFA attempts in the SonicOS SSLVPN interface, which may allow a remote authenticated attacker to use excessive MFA codes.

Note that Nessus has not tested for these issues but has instead relied only on the firewall's self-reported version number.


Upgrade to the relevant fixed version referenced in the vendor security advisory.

See Also

Plugin Details

Severity: High

ID: 172440

File Name: sonicwall_SNWLID-2023-0005.nasl

Version: 1.2

Type: combined

Family: Firewalls

Published: 3/10/2023

Updated: 3/15/2023

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2023-1101


Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:sonicwall:sonicos, x-cpe:/h:sonicwall:nsv

Required KB Items: Host/OS

Exploit Ease: No known exploits are available

Patch Publication Date: 3/2/2023

Vulnerability Publication Date: 3/2/2023

Reference Information

CVE: CVE-2023-1101