Description
SonicWALL SOHO uses easily predictable TCP sequence numbers, which allows remote attackers to spoof or hijack sessions.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2001-1085 | SonicWALL SOHO uses easily predictable TCP sequence numbers, which allows remote attackers to spoof or hijack sessions. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T04:44:07.391Z
Reserved: 2002-03-15T00:00:00.000Z
Link: CVE-2001-1104
No data.
Status : Modified
Published: 2001-07-25T04:00:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2001-1104
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD