Description
Vulnerability in SonicWall SMA100 NetExtender Windows (32 and 64-bit) client 10.2.339 and earlier versions allows an attacker to arbitrary code execution when processing an EPC Client update.
Published: 2024-07-18
Score: 7.1 High
EPSS: 1.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 27 Nov 2024 05:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:sonicwall:netextender:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}


Tue, 10 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Sonicwall
Sonicwall netextender
CPEs cpe:2.3:a:sonicwall:netextender:*:*:*:*:*:windows:*:*
Vendors & Products Sonicwall
Sonicwall netextender
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Sonicwall Netextender
cve-icon MITRE

Status: PUBLISHED

Assigner: sonicwall

Published:

Updated: 2024-11-27T04:55:16.232Z

Reserved: 2024-03-14T03:29:41.180Z

Link: CVE-2024-29014

cve-icon Vulnrichment

Updated: 2024-08-02T01:03:51.738Z

cve-icon NVD

Status : Modified

Published: 2024-07-18T08:15:02.173

Modified: 2024-11-21T09:07:22.613

Link: CVE-2024-29014

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses