Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:
CYBER ALERT
Home / CYBER ALERT
/
Vulnerabilities in SonicWall Products (AL01/241011/CSIRT-ITA)

Vulnerabilities in SonicWall Products (AL01/241011/CSIRT-ITA)

Summary

3 vulnerabilities, 2 of which are high severity, have been discovered in SonicWall Secure Mobile Access (SMA) 1000 products. These vulnerabilities, if exploited, could allow an attacker to bypass security mechanisms and elevate user privileges on affected devices.

Risk

Vulnerability Community Impact Estimate: MEDIUM/YELLOW (63.84/100)1.

Type

  • Privilege Escalation
  • Security Restrictions Bypass

Affected Products and/or Versions

  • SMA1000 Connect Tunnel Client for Windows (32-bit and 64-bit), version 12.4.3.271 and earlier
  • SMA1000 Appliance, firmware version 12.4.3-02676 and earlier

Note: The vulnerabilities do not affect Connect Tunnel Client versions for Linux and macOS.

Mitigation Actions

In line with vendor statements, it is recommended to update vulnerable products to the latest available versions.

Unique Vulnerability Identifiers

The following are the CVEs for “High” severity vulnerabilities only:

CVE-2024-45316

CVE-2024-45317

References

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0017

1This estimate is made taking into account several parameters, including: CVSS, availability of patches/workarounds and PoC, diffusion of the affected software/devices in the reference community.

Recommended to you

Search in 365TRUST

Our services