CVE-2024-29010

7.1 HIGH
XXE

📋 TL;DR

This XXE vulnerability in GMS ECM URL endpoint allows attackers to process malicious XML documents that can reference external entities, potentially leading to sensitive information disclosure. It affects SonicWall Global Management System (GMS) versions 9.3.4 and earlier. Attackers could read files from the server or perform server-side request forgery.

💻 Affected Systems

Products:
  • SonicWall Global Management System (GMS)
Versions: 9.3.4 and earlier
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the ECM URL endpoint specifically when processing XML documents.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise including reading sensitive files (passwords, configuration), performing SSRF attacks to internal systems, and potential denial of service.

🟠

Likely Case

Information disclosure of local files on the GMS server, potentially including configuration files with credentials or sensitive system information.

🟢

If Mitigated

Limited impact with proper network segmentation, XML parsing restrictions, and input validation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

XXE vulnerabilities typically have low exploitation complexity but may require some XML knowledge. The advisory suggests authentication is required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.3.5 or later

Vendor Advisory: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0007

Restart Required: Yes

Instructions:

1. Download GMS 9.3.5 or later from SonicWall support portal. 2. Backup current configuration. 3. Install the update following SonicWall's upgrade guide. 4. Restart GMS services.

🔧 Temporary Workarounds

Disable external entity processing

all

Configure XML parser to disable external entity resolution

Input validation

all

Implement strict input validation for XML documents at the ECM URL endpoint

🧯 If You Can't Patch

  • Restrict network access to GMS management interface to trusted IPs only
  • Implement WAF rules to block XXE patterns in XML requests

🔍 How to Verify

Check if Vulnerable:

Check GMS version via web interface or CLI. Versions 9.3.4 and earlier are vulnerable.

Check Version:

Check web interface or run 'gms --version' on the server

Verify Fix Applied:

Verify GMS version is 9.3.5 or later and test XML processing at ECM endpoint with XXE payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML processing errors
  • Requests to ECM URL endpoint with XML content
  • File read attempts in logs

Network Indicators:

  • XML requests containing external entity references
  • Unusual outbound connections from GMS server

SIEM Query:

source="gms_logs" AND ("ECM" OR "XML") AND ("error" OR "exception")

🔗 References

📤 Share & Export