Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-51118 | A post-authentication format string vulnerability in SonicOS management allows a remote attacker to crash a firewall and potentially leads to code execution. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 17 Jan 2025 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 09 Jan 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 09 Jan 2025 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A post-authentication format string vulnerability in SonicOS management allows a remote attacker to crash a firewall and potentially leads to code execution. | |
| Weaknesses | CWE-134 | |
| References |
|
Status: PUBLISHED
Assigner: sonicwall
Published:
Updated: 2025-01-17T02:15:26.594Z
Reserved: 2024-12-19T16:36:08.986Z
Link: CVE-2024-12805
Updated: 2025-01-09T14:54:45.959Z
Status : Awaiting Analysis
Published: 2025-01-09T08:15:26.247
Modified: 2025-01-17T03:15:07.167
Link: CVE-2024-12805
No data.
OpenCVE Enrichment
No data.
EUVD