First published: Thu Jan 09 2025(Updated: )
This vulnerability allows remote attackers to initiate arbitrary server-side requests on affected installations of SonicWALL NSv. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.1. The following CVEs are assigned: CVE-2024-53705.
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall NSv |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-24820 is classified as critical due to the potential for remote exploitation and bypassing of authentication mechanisms.
To fix ZDI-CAN-24820, ensure you update your SonicWALL NSv installation to the latest patched version provided by the vendor.
ZDI-CAN-24820 allows attackers to initiate arbitrary server-side requests, potentially leading to data breaches or unauthorized access.
Yes, while authentication is required to exploit ZDI-CAN-24820, its mechanism can be bypassed by attackers.
ZDI-CAN-24820 affects installations of SonicWALL NSv software.