First published: Thu Jan 09 2025(Updated: )
This vulnerability allows remote attackers to initiate arbitrary server-side requests on affected installations of SonicWALL NSv. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.1. The following CVEs are assigned: CVE-2024-53705.
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall NSv |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-25-013 has a high severity rating due to its potential for remote exploitation.
To fix ZDI-25-013, apply the latest security patches provided by SonicWALL for the NSv version.
Organizations using SonicWALL NSv are affected by ZDI-25-013 if they have not implemented the necessary updates.
ZDI-25-013 can lead to unauthorized server-side requests, compromising the security of affected systems.
No, the existing authentication mechanism can be bypassed, making additional security measures essential.