SonicWall has confirmed that Global VPN Client (GVC) installer 4.10.7.1117 (32-bit and 64-bit) and earlier versions have three specific vulnerabilities in one of the installer components as outlined below:
There is no evidence that these vulnerabilities are being exploited in the wild. All three vulnerabilities can only be exploited after the adversary gains control of the machine, has admin privilege or is able to place malicious files on the machine. The vulnerabilities can’t be exploited on a clean system.
SonicWall strongly urges that organizations using the Global VPN Client (GVC) in your network follow the guidance below.
Successful exploitation via a privileged user could result in command execution in the target system. All vulnerable DLL components are located in the RunMSI.exe part of the installer. A vulnerable installer component (RunMSI.exe) is vulnerable to a total of 15 variations of the DLL Search Order Hijacking.
These vulnerabilities require user interaction and running of the vulnerable installer. Command execution in the target system needs to be executed with administrator privileges. The GVC installer doesn't remove problematic RarSFX folder and its content after installation.
If a user does not have administrator privileges, there is no way to execute the vulnerable installers. Only when an administrator explicitly executes the installers, or the target system is already compromised by administrator privileges, potential DLL Hijacking could occur.
Please follow the resolution steps below based on your organization’s specific use case(s).
Vulnerability | Affected Version/Scope | User Resolution |
Global VPN Client DLL Search Order Hijacking via Application Installer (RunMSI.exe) | Previous installers |
|
Problematic RarSFX folders left in host machine after installation | Host machine which are running below 64-bit installers:
|
|
DLL Highjacking over Microsoft Foundation Class DLLs | 32bit GVC (X86 GVC) only |
|
To download the script which will remove the RarSFX folder please perform the following: