First published: Fri Feb 23 2024(Updated: )
Improper access control vulnerability has been identified in the SMA100 SSL-VPN virtual office portal, which in specific conditions could potentially enable a remote authenticated attacker to associate another user's MFA mobile application.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
SonicWall SMA 200 | <10.2.1.11-65sv | |
SonicWall SMA 200 firmware | ||
All of | ||
SonicWall SMA 210 | <10.2.1.11-65sv | |
SonicWall SMA 210 Firmware | ||
All of | ||
SonicWall SMA 400 | <10.2.1.11-65sv | |
SonicWall SMA 400 firmware | ||
All of | ||
SonicWall SMA 410 | <10.2.1.11-65sv | |
SonicWall SMA 410 | ||
All of | ||
SonicWall SMA 500v Firmware | <10.2.1.11-65sv | |
SonicWall SMA 500v Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22395 has been assessed as a medium severity vulnerability due to improper access control leading to potential multi-factor authentication (MFA) association issues.
To mitigate CVE-2024-22395, upgrade your SonicWall SMA firmware to version 10.2.1.11-65sv or later.
CVE-2024-22395 affects SonicWall SMA 200, SMA 210, SMA 400, SMA 410, and SMA 500v firmware versions prior to 10.2.1.11-65sv.
Yes, CVE-2024-22395 may allow a remote authenticated attacker to exploit the vulnerability under certain conditions.
The implications of CVE-2024-22395 include unauthorized access to another user's MFA application, which could lead to compromised accounts.