Description
A Server-Side Request Forgery vulnerability in the SonicOS SSH management interface allows a remote attacker to establish a TCP connection to an IP address on any port when the user is logged in to the firewall.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-52038 | A Server-Side Request Forgery vulnerability in the SonicOS SSH management interface allows a remote attacker to establish a TCP connection to an IP address on any port when the user is logged in to the firewall. |
References
History
Thu, 09 Jan 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 09 Jan 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Server-Side Request Forgery vulnerability in the SonicOS SSH management interface allows a remote attacker to establish a TCP connection to an IP address on any port when the user is logged in to the firewall. | |
| Weaknesses | CWE-918 | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: sonicwall
Published:
Updated: 2025-01-09T15:03:52.395Z
Reserved: 2024-11-22T09:54:04.964Z
Link: CVE-2024-53705
Updated: 2025-01-09T15:03:44.601Z
Status : Deferred
Published: 2025-01-09T07:15:27.363
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-53705
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD