fkie_cve-2024-40764
Vulnerability from fkie_nvd
Published
2024-07-18 08:15
Modified
2024-11-21 09:31
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Heap-based buffer overflow vulnerability in the SonicOS IPSec VPN allows an unauthenticated remote attacker to cause Denial of Service (DoS).
References
| URL | Tags | ||
|---|---|---|---|
| PSIRT@sonicwall.com | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0012 | Mitigation, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0012 | Mitigation, Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| sonicwall | sonicos | * | |
| sonicwall | nsv10 | - | |
| sonicwall | nsv100 | - | |
| sonicwall | nsv1600 | - | |
| sonicwall | nsv200 | - | |
| sonicwall | nsv25 | - | |
| sonicwall | nsv300 | - | |
| sonicwall | nsv400 | - | |
| sonicwall | nsv50 | - | |
| sonicwall | nsv800 | - | |
| sonicwall | sonicos | * | |
| sonicwall | sonicos | * | |
| sonicwall | nsa_2700 | - | |
| sonicwall | nsa_3700 | - | |
| sonicwall | nsa_4700 | - | |
| sonicwall | nsa_5700 | - | |
| sonicwall | nsa_6700 | - | |
| sonicwall | nssp_10700 | - | |
| sonicwall | nssp_11700 | - | |
| sonicwall | nssp_13700 | - | |
| sonicwall | nssp_15700 | - | |
| sonicwall | nsv_270 | - | |
| sonicwall | nsv_470 | - | |
| sonicwall | nsv_870 | - | |
| sonicwall | tz270 | - | |
| sonicwall | tz270w | - | |
| sonicwall | tz370 | - | |
| sonicwall | tz370w | - | |
| sonicwall | tz470 | - | |
| sonicwall | tz470w | - | |
| sonicwall | tz570 | - | |
| sonicwall | tz570p | - | |
| sonicwall | tz570w | - | |
| sonicwall | tz670 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8842B1FC-9CC4-4DB8-8119-B435CD33A5D1",
"versionEndExcluding": "6.5.4.v-21s-rc2457",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F5B29EE-9D04-44CC-BB1F-C3C6130D2708",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6153BB-7B2C-4307-ABE0-0E7E1745DEC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93914C8C-69ED-480C-80F2-4334C00788D8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE26ECE3-9E17-456F-A416-E23A758C9E4C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67EEA85D-8F9E-4E41-B8B3-119738375A84",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D33997-0D65-464E-8AA5-043499C667D1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D13CD6CF-B048-4214-AAA8-AB58BE6C6C5E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA838CC7-083A-4BF1-9C95-BED6F5A2992C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0171D69-14A6-4AB0-8377-C233F5E192D8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BE881F9C-CE9E-4D1B-92BA-D28B2B16178A",
"versionEndExcluding": "7.0.1-5161",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "797C9FA3-70EF-492A-ACA3-CE21422D5AAA",
"versionEndExcluding": "7.1.1-7058",
"versionStartIncluding": "7.1.1-7040",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D8B0C7A-FD65-47CA-A625-150A90EFA7A1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A69E000B-5806-46FD-A233-4E2CC9DD38D2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DF4A322-7CC7-4AB9-B10E-FFF34DF2182D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C15FED5-C48C-47CF-9645-0563D77883C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A884B1BB-F201-4C77-9F6E-B8A884DCD4C2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C3BA5A3-1160-4793-A8D6-40B9D264BCC4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6739DEA3-06FF-4FEB-9931-0DB27F63B70E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0250EDF9-0AEF-4711-8EF6-D447CF48BCAF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7D6CF3CF-256C-4C04-8BDF-B16398CD0459",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsv_270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2ABC8D8-2943-4073-9568-E87961A18998",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsv_470:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F57D527-AA3F-45E9-9BCE-6F76691066B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsv_870:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5ECCCF0-A5D8-42A8-8EC1-D12B49B1124A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow vulnerability in the SonicOS IPSec VPN allows an unauthenticated remote attacker to cause Denial of Service (DoS)."
},
{
"lang": "es",
"value": "Una vulnerabilidad de desbordamiento de b\u00fafer basada en mont\u00f3n en SonicOS IPSec VPN permite que un atacante remoto no autenticado provoque una denegaci\u00f3n de servicio (DoS)."
}
],
"id": "CVE-2024-40764",
"lastModified": "2024-11-21T09:31:34.703",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-07-18T08:15:02.340",
"references": [
{
"source": "PSIRT@sonicwall.com",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0012"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0012"
}
],
"sourceIdentifier": "PSIRT@sonicwall.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-122"
}
],
"source": "PSIRT@sonicwall.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…