First published: Thu Dec 05 2024(Updated: )
A vulnerability in the SonicWall SMA100 SSLVPN firmware 10.2.1.13-72sv and earlier versions allows a remote authenticated attacker can circumvent the certificate requirement during authentication.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall SSL VPN | <10.2.1.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45319 is considered a high severity vulnerability due to its potential impact on authentication security.
To fix CVE-2024-45319, upgrade your SonicWall SMA100 SSLVPN firmware to version 10.2.1.14 or later.
CVE-2024-45319 affects all installations of SonicWall SMA100 SSLVPN running firmware versions 10.2.1.13-72sv and earlier.
Yes, CVE-2024-45319 can be exploited remotely by an authenticated attacker who can bypass the certificate requirement.
The primary risk associated with CVE-2024-45319 is that it allows unauthorized access to the VPN by circumventing the intended authentication processes.