Vulnerability in SonicWall SMA100 NetExtender Windows (32 and 64-bit) client 10.2.339 and earlier versions allows an attacker to arbitrary code execution when processing an EPC Client update.
References
Link | Resource |
---|---|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0011 | Vendor Advisory |
Configurations
History
10 Sep 2024, 14:12
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
First Time |
Sonicwall
Sonicwall netextender |
|
CPE | cpe:2.3:a:sonicwall:netextender:*:*:*:*:*:windows:*:* | |
References | () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0011 - Vendor Advisory |
01 Aug 2024, 13:49
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
Summary |
|
18 Jul 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Vulnerability in SonicWall SMA100 NetExtender Windows (32 and 64-bit) client 10.2.339 and earlier versions allows an attacker to arbitrary code execution when processing an EPC Client update. |
18 Jul 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-18 08:15
Updated : 2024-09-10 14:12
NVD link : CVE-2024-29014
Mitre link : CVE-2024-29014
CVE.ORG link : CVE-2024-29014
JSON object : View
Products Affected
sonicwall
- netextender
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')