First published: Thu Feb 08 2024(Updated: )
An improper authentication vulnerability has been identified in SonicWall SonicOS SSL-VPN feature, which in specific conditions could allow a remote attacker to bypass authentication. This issue affects only firmware version SonicOS 7.1.1-7040.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
SonicWall SonicOS | =7.1.1-7040 | |
Any of | ||
Sonicwall Nsa 2700 | ||
Sonicwall Nsa 3700 | ||
Sonicwall Nsa 4700 | ||
Sonicwall Nsa 5700 | ||
Sonicwall Nsa 6700 | ||
Sonicwall Nssp 10700 | ||
Sonicwall Nssp 11700 | ||
Sonicwall Nssp 13700 | ||
Sonicwall Nsv 270 | ||
Sonicwall Nsv 470 | ||
Sonicwall Nsv 870 | ||
Sonicwall T2270 | ||
Sonicwall Tz270w | ||
Sonicwall Tz370 | ||
Sonicwall Tz370w | ||
Sonicwall Tz470 | ||
Sonicwall Tz470w | ||
Sonicwall Tz570 | ||
Sonicwall Tz570p | ||
Sonicwall Tz570w | ||
Sonicwall Tz670 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22394 is categorized as a high severity vulnerability due to its potential to allow remote unauthenticated access.
To fix CVE-2024-22394, upgrade to a patched version of SonicOS that addresses this vulnerability.
CVE-2024-22394 specifically affects SonicWall SonicOS firmware version 7.1.1-7040.
CVE-2024-22394 is an improper authentication vulnerability in the SSL-VPN feature of SonicWall SonicOS.
Yes, CVE-2024-22394 can be exploited remotely by attackers to bypass authentication under specific conditions.