Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-51119 | A post-authentication absolute path traversal vulnerability in SonicOS management allows a remote attacker to read an arbitrary file. |
Fri, 17 Jan 2025 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 09 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 09 Jan 2025 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A post-authentication absolute path traversal vulnerability in SonicOS management allows a remote attacker to read an arbitrary file. | |
| Weaknesses | CWE-37 | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: sonicwall
Published:
Updated: 2025-01-17T02:17:43.603Z
Reserved: 2024-12-19T16:36:12.999Z
Link: CVE-2024-12806
Updated: 2025-01-09T20:17:25.153Z
Status : Deferred
Published: 2025-01-09T08:15:26.417
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-12806
No data.
OpenCVE Enrichment
No data.
EUVD