{"vulnerability": "CVE-2024-12802", "sightings": [{"uuid": "745da44c-4861-4d5f-96a0-f9a5c282d78c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12802", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113822502051441311", "content": "", "creation_timestamp": "2025-01-13T18:39:10.538395Z"}, {"uuid": "0627bb19-0cd1-41b3-bf8c-d7c0ebf350fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12802", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113799182687696299", "content": "", "creation_timestamp": "2025-01-09T15:48:44.873757Z"}, {"uuid": "98dce4fb-708d-4c4c-ad8b-a2e9cbd4738d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12802", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113797613241927061", "content": "", "creation_timestamp": "2025-01-09T09:09:36.829548Z"}, {"uuid": "37c5efd3-8692-43f0-bb46-0c3014838379", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12802", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfcdpg5lmk2i", "content": "", "creation_timestamp": "2025-01-09T09:15:20.074680Z"}, {"uuid": "a2540be5-9676-4d28-aae2-0ae423a1d0dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12802", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113789285485490767", "content": "", "creation_timestamp": "2025-01-07T21:51:45.470434Z"}, {"uuid": "ffc042a1-e535-4d06-9d8c-1df5e1d57451", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12802", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/923", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12802\n\ud83d\udd39 Description: SSL-VPN MFA Bypass in SonicWALL SSL-VPN can arise in specific cases due to the separate handling of UPN (User Principal Name) and SAM (Security Account Manager) account names when integrated with Microsoft Active Directory, allowing MFA to be configured independently for each login method and potentially enabling attackers to bypass MFA by exploiting the alternative account name.\n\ud83d\udccf Published: 2025-01-09T09:08:26.012Z\n\ud83d\udccf Modified: 2025-01-09T09:08:26.012Z\n\ud83d\udd17 References:\n1. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0001", "creation_timestamp": "2025-01-09T09:14:14.000000Z"}, {"uuid": "d4bdf883-052e-4917-a609-aaf4ee124223", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-12802", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/602ffeaf-2425-48cc-967c-0efad9629dd0", "content": "", "creation_timestamp": "2025-01-07T12:38:58.150623Z"}, {"uuid": "3f9ec7c3-d21e-449f-a484-631e35deae74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12802", "type": "seen", "source": "https://t.me/cvedetector/14824", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12802 - SonicWALL SSL-VPN Active Directory MFA Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-12802 \nPublished : Jan. 9, 2025, 9:15 a.m. | 41\u00a0minutes ago \nDescription : SSL-VPN MFA Bypass in SonicWALL SSL-VPN can arise in specific cases due to the separate handling of UPN (User Principal Name) and SAM (Security Account Manager) account names when integrated with Microsoft Active Directory, allowing MFA to be configured independently for each login method and potentially enabling attackers to bypass MFA by exploiting the alternative account name. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T11:04:23.000000Z"}]}