Dell SonicWALL Scrutinizer SQL injection vulnerability

ID VU:404051
Type cert
Reporter CERT
Modified 2013-05-15T00:00:00



Dell SonicWALL Scrutinizer 9.5.0 and older versions contain a SQL injection vulnerability.


The Dell SonicWALL service bulletin states:

"After the release of Dell SonicWALL Scrutinizer 9.5.0, we received a report of an issue whereby a Scrutinizer user who had already authenticated to the product could manipulate a certain URL to run SQL commands against the Scrutinizer database. Error output was also displayed which provided debug information detailing the query being run. While the risk to most Scrutinizer installations was low, we decided to proactively publish a patched update to fix this vulnerability in the form of Scrutinizer 9.5.2."

Additional details may be found in the full Dell SonicWALL service bulletin. [PDF]


A remote authenticated attacker may be able to run arbitrary SQL commands and exfiltrate sensitive data.


Apply an Update

The Dell SonicWALL service bulletin states:

"We recommend existing users of Dell SonicWALL Scrutinizer 9.5.0 and earlier versions upgrade to version 9.5.2 to prevent unauthorized queries from being run via the URL by authenticated users. Version 9.5.2 is available for download from Users should log onto mySonicWALL and click on Downloads > Download Center in the navigation panel on the left, then select “Scrutinizer Software” in the Software Type drop down menu."

Vendor Information

Vendor| Status| Date Notified| Date Updated
Dell Computer Corporation, Inc.| | 29 Jun 2012| 25 Jul 2012
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
Base | 6.5 | AV:N/AC:L/Au:S/C:P/I:P/A:P
Temporal | 5.4 | E:F/RL:OF/RC:C
Environmental | 5.4 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND


  • <>


Thanks to Offensive Security for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

  • CVE IDs: CVE-2012-2962
  • Date Public: 20 Jul 2012
  • Date First Published: 25 Jul 2012
  • Date Last Updated: 15 May 2013
  • Document Revision: 16