Description
Vulnerability in SonicWall SMA100 NetExtender Windows (32 and 64-bit) client 10.2.339 and earlier versions allows an attacker to arbitrary code execution when processing an EPC Client update.
Published: 2024-07-18
Score: 7.1 High
EPSS: 1.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 27 Nov 2024 05:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:sonicwall:netextender:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}


Tue, 10 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Sonicwall
Sonicwall netextender
CPEs cpe:2.3:a:sonicwall:netextender:*:*:*:*:*:windows:*:*
Vendors & Products Sonicwall
Sonicwall netextender
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Sonicwall Netextender
cve-icon MITRE

Status: PUBLISHED

Assigner: sonicwall

Published:

Updated: 2024-11-27T04:55:16.232Z

Reserved: 2024-03-14T03:29:41.180Z

Link: CVE-2024-29014

cve-icon Vulnrichment

Updated: 2024-08-02T01:03:51.738Z

cve-icon NVD

Status : Modified

Published: 2024-07-18T08:15:02.173

Modified: 2024-11-21T09:07:22.613

Link: CVE-2024-29014

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses