Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-52038 | A Server-Side Request Forgery vulnerability in the SonicOS SSH management interface allows a remote attacker to establish a TCP connection to an IP address on any port when the user is logged in to the firewall. |
Thu, 09 Jan 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 09 Jan 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Server-Side Request Forgery vulnerability in the SonicOS SSH management interface allows a remote attacker to establish a TCP connection to an IP address on any port when the user is logged in to the firewall. | |
| Weaknesses | CWE-918 | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: sonicwall
Published:
Updated: 2025-01-09T15:03:52.395Z
Reserved: 2024-11-22T09:54:04.964Z
Link: CVE-2024-53705
Updated: 2025-01-09T15:03:44.601Z
Status : Deferred
Published: 2025-01-09T07:15:27.363
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-53705
No data.
OpenCVE Enrichment
No data.
EUVD