First published: Wed Jan 17 2024(Updated: )
SonicWall Capture Client version 3.7.10, NetExtender client version 10.2.337 and earlier versions are installed with sfpmonitor.sys driver. The driver has been found to be vulnerable to Denial-of-Service (DoS) caused by Stack-based Buffer Overflow vulnerability.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall Capture Client | <=3.7.10 | |
SonicWall NetExtender | <=10.2.337 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6340 is classified as a Denial-of-Service vulnerability due to a stack-based buffer overflow.
To fix CVE-2023-6340, update SonicWall Capture Client to version 3.7.11 or later and NetExtender to version 10.2.338 or later.
CVE-2023-6340 affects SonicWall Capture Client versions up to 3.7.10 and NetExtender versions up to 10.2.337.
The sfpmonitor.sys driver is the component that contains the stack-based buffer overflow vulnerability in CVE-2023-6340.
The potential impact of CVE-2023-6340 includes denial-of-service conditions that can cause interruptions in service availability.