{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T04:17:41.722","vulnerabilities":[{"cve":{"id":"CVE-2023-34123","sourceIdentifier":"PSIRT@sonicwall.com","published":"2023-07-13T00:15:24.387","lastModified":"2024-11-21T08:06:35.690","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Use of Hard-coded Cryptographic Key vulnerability in SonicWall GMS, SonicWall Analytics. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"PSIRT@sonicwall.com","type":"Secondary","description":[{"lang":"en","value":"CWE-321"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-798"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sonicwall:global_management_system:*:*:*:*:virtual_appliance:*:*:*","versionEndExcluding":"9.3.2","matchCriteriaId":"12CB3495-2949-4D79-98F9-2156B0296C94"},{"vulnerable":true,"criteria":"cpe:2.3:a:sonicwall:global_management_system:*:*:*:*:windows:*:*:*","versionEndExcluding":"9.3.2","matchCriteriaId":"6215D18A-7254-453B-93BF-4FFD8417D0AB"},{"vulnerable":true,"criteria":"cpe:2.3:a:sonicwall:global_management_system:9.3.2:-:*:*:virtual_appliance:*:*:*","matchCriteriaId":"9F193D8D-EC75-49E4-9510-74534518A276"},{"vulnerable":true,"criteria":"cpe:2.3:a:sonicwall:global_management_system:9.3.2:-:*:*:windows:*:*:*","matchCriteriaId":"7D33D05B-F776-44C7-BE77-B0656C9449A9"},{"vulnerable":true,"criteria":"cpe:2.3:a:sonicwall:global_management_system:9.3.2:sp1:*:*:virtual_appliance:*:*:*","matchCriteriaId":"C00FB351-6120-4C1B-B621-2D7C1ED13966"},{"vulnerable":true,"criteria":"cpe:2.3:a:sonicwall:global_management_system:9.3.2:sp1:*:*:windows:*:*:*","matchCriteriaId":"654B1441-A169-499C-B061-8E49535FC60D"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sonicwall:analytics:*:*:*:*:*:*:*:*","versionEndExcluding":"2.5.0.4","matchCriteriaId":"3141B9EA-D34E-4F30-B4D8-413505FBEC53"},{"vulnerable":true,"criteria":"cpe:2.3:a:sonicwall:analytics:2.5.0.4-r7:*:*:*:*:*:*:*","matchCriteriaId":"8C05380F-06DD-40DE-B5F3-E6E2E188D229"}]}]}],"references":[{"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010","source":"PSIRT@sonicwall.com","tags":["Vendor Advisory"]},{"url":"https://www.sonicwall.com/support/notices/230710150218060","source":"PSIRT@sonicwall.com","tags":["Vendor Advisory"]},{"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.sonicwall.com/support/notices/230710150218060","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}