Description
An improper Limitation of a Pathname to a Restricted Directory (Path Traversal) vulnerability in SonicWall Email Security Appliance could allow a remote attacker with administrative privileges to conduct a directory traversal attack and delete arbitrary files from the appliance file system.
Published: 2024-03-14
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 08 Aug 2024 23:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-23
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}


Subscriptions

Sonicwall Email Security
cve-icon MITRE

Status: PUBLISHED

Assigner: sonicwall

Published:

Updated: 2024-08-08T21:19:19.995Z

Reserved: 2024-01-10T09:52:23.463Z

Link: CVE-2024-22398

cve-icon Vulnrichment

Updated: 2024-08-01T22:43:34.875Z

cve-icon NVD

Status : Deferred

Published: 2024-03-14T04:15:09.417

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-22398

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T22:31:16Z

Weaknesses