Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-52035 | Use of cryptographically weak pseudo-random number generator (PRNG) vulnerability in the SonicWall SMA100 SSLVPN backup code generator that, in certain cases, can be predicted by an attacker, potentially exposing the generated secret. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 05 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sonicwall
Sonicwall sma100 Firmware |
|
| CPEs | cpe:2.3:o:sonicwall:sma100_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Sonicwall
Sonicwall sma100 Firmware |
|
| Metrics |
cvssV3_1
|
Thu, 05 Dec 2024 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Use of cryptographically weak pseudo-random number generator (PRNG) vulnerability in the SonicWall SMA100 SSLVPN backup code generator that, in certain cases, can be predicted by an attacker, potentially exposing the generated secret. | |
| Weaknesses | CWE-338 | |
| References |
|
Status: PUBLISHED
Assigner: sonicwall
Published:
Updated: 2024-12-05T15:10:12.280Z
Reserved: 2024-11-22T09:54:04.963Z
Link: CVE-2024-53702
Updated: 2024-12-05T15:09:27.965Z
Status : Awaiting Analysis
Published: 2024-12-05T14:15:21.880
Modified: 2024-12-05T16:15:26.077
Link: CVE-2024-53702
No data.
OpenCVE Enrichment
No data.
EUVD