Three buffer overflow vulnerabilities could lead to code execution and three others concern path traversal, authentication bypass, and insecure randomness
Summary
Three buffer overflow vulnerabilities could lead to code execution and three others concern path traversal, authentication bypass, and insecure randomness
Affected platforms
The following platforms are known to be affected:
Threat details
Introduction
SonicWall has released a security advisory to address six vulnerabilities in SMA100 SSL-VPN appliances. SonicWall Secure Mobile Access (SMA) is a unified secure access gateway that provides a Secure Sockets Layer (SSL) virtual private network (VPN), context aware device authorisation, application level VPN, and advanced authentication with federated single sign-on (SSO) for cloud and on-premises resources.
Vulnerability details
CVE-2024-38475 - attributed to publicly known Apache HTTP Server vulnerability
CVE-2024-40763 - affecting SonicWALL SMA100 SSLVPN
CVE-2024-45318 - affecting SonicWall SMA100 SSLVPN web management interface
CVE-2024-45319 - affecting SonicWall SMA100 SSLVPN
CVE-2024-53702 - affecting SonicWall SMA100 SSLVPN backup code generator
CVE-2024-53703 - affecting SonicWall SMA100 SSLVPN mod_httprp library loaded by the Apache web server
Remediation advice
Affected organisations are encouraged to review SonicWall advisory SNWLID-2024-0018 and apply the relevant updates.
Definitive source of threat updates
CVE Vulnerabilities
Last edited: 5 December 2024 3:41 pm