CVE-2023-44218

8.8 HIGH

📋 TL;DR

This vulnerability allows an unauthorized user to exploit SonicWall NetExtender's Pre-Logon feature to gain SYSTEM-level privileges on Windows hosts, leading to local privilege escalation. It affects organizations using SonicWall NetExtender with the Pre-Logon feature enabled.

💻 Affected Systems

Products:
  • SonicWall NetExtender
Versions: Versions prior to 10.2.336
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with NetExtender Pre-Logon feature enabled. The vulnerability is in the client software, not the VPN gateway.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full SYSTEM-level control over the Windows host, enabling installation of malware, credential theft, lateral movement, and complete system compromise.

🟠

Likely Case

Local attackers or malware with initial access escalate privileges to SYSTEM, enabling persistence, credential dumping, and bypassing security controls.

🟢

If Mitigated

With Pre-Logon disabled and proper network segmentation, impact is limited to local privilege escalation only for users with initial access.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the Windows system. The vulnerability is in the client-side Pre-Logon feature.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: NetExtender 10.2.336 and later

Vendor Advisory: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0014

Restart Required: Yes

Instructions:

1. Download NetExtender 10.2.336 or later from the SonicWall support portal. 2. Uninstall the current NetExtender client. 3. Install the updated version. 4. Restart the system.

🔧 Temporary Workarounds

Disable Pre-Logon Feature

windows

Disable the NetExtender Pre-Logon feature to prevent exploitation of this vulnerability.

1. Open NetExtender client
2. Go to Settings > Pre-Logon
3. Uncheck 'Enable Pre-Logon'
4. Click OK and restart NetExtender

🧯 If You Can't Patch

  • Disable NetExtender Pre-Logon feature immediately
  • Implement strict endpoint security controls and monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check NetExtender version: Open NetExtender > Help > About. If version is below 10.2.336 and Pre-Logon is enabled, the system is vulnerable.

Check Version:

Check NetExtender About dialog or registry: HKEY_LOCAL_MACHINE\SOFTWARE\SonicWall\NetExtender\Version

Verify Fix Applied:

Verify NetExtender version is 10.2.336 or higher and Pre-Logon is disabled or updated.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing unexpected SYSTEM privilege acquisition
  • NetExtender logs showing Pre-Logon authentication anomalies

Network Indicators:

  • Unusual network connections from SYSTEM context following NetExtender usage

SIEM Query:

EventID=4688 AND NewProcessName LIKE '%netextender%' AND SubjectUserName='SYSTEM'

🔗 References

📤 Share & Export