First published: Thu Jan 09 2025(Updated: )
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in the SonicOS SSLVPN authentication token generator that, in certain cases, can be predicted by an attacker potentially resulting in authentication bypass.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall SonicOS SSL VPN NAC Agent |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-40762 is considered critical due to the potential for an attacker to bypass authentication.
To fix CVE-2024-40762, update your SonicWall SonicOS to the latest patched version immediately.
SonicWall SonicOS is the affected software for CVE-2024-40762.
CVE-2024-40762 is a vulnerability related to the use of a cryptographically weak pseudo-random number generator.
Yes, exploitation of CVE-2024-40762 could result in authentication bypass, potentially leading to unauthorized access and data breaches.