Impact
This vulnerability allows a remote attacker to distinguish the responses of an SSL VPN service based on credential correctness. By observing subtle response differences, an attacker can confirm the validity of user names and passwords. The weakness resides in improper handling of authentication responses, pinpointed by CWE-204. Such enumeration could lead to credential compromise, enabling unauthorized access to the VPN and potentially to any resources accessible through it.
Affected Systems
Products affected are SonicWall SMA1000 series appliances. No specific firmware or configuration version ranges are listed in the available data.
Risk and Exploitability
The exploit is remote, targeting the SSL VPN interface over the network. Because no CVSS score or EPSS value is provided, the formal severity cannot be quantified, but the ability to enumerate valid credentials is inherently a high‑risk security issue. The vulnerability is not currently catalogued in CISA’s Known Exploited Vulnerabilities list, suggesting no widespread exploitation has been reported yet. An attacker would need network access to the SCCVPN endpoint and would benefit from repeated, automated trials to map valid usernames and passwords.
OpenCVE Enrichment