First published: Thu Mar 14 2024(Updated: )
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in the SonicOS SSLVPN portal allows a remote authenticated attacker as a firewall 'admin' user to store and execute arbitrary JavaScript code.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall SonicOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22397 is considered a high severity vulnerability due to its potential for remote exploitation by authenticated attackers.
To fix CVE-2024-22397, ensure that you apply the latest security patches provided by SonicWall for SonicOS.
CVE-2024-22397 affects SonicWall SonicOS SSLVPN users, specifically those with admin privileges.
CVE-2024-22397 is a Cross-site Scripting (XSS) vulnerability that allows execution of arbitrary JavaScript code.
The potential impacts of CVE-2024-22397 include unauthorized access to sensitive data and the ability to manipulate web sessions.