Undergoing Analysis
CVE has been recently published to the CVE List and has been received by the NVD.
CVE has been recently published to the CVE List and has been received by the NVD.
Products
SonicWall NetExtender Windows client
- 10.2.339 and earlier
Source
PSIRT@sonicwall.com
Tags
CVE-2024-29014 details
Published : July 18, 2024, 8:15 a.m.
Last Modified : July 18, 2024, 5:15 p.m.
Last Modified : July 18, 2024, 5:15 p.m.
Description
Vulnerability in SonicWall SMA100 NetExtender Windows (32 and 64-bit) client 10.2.339 and earlier versions allows an attacker to arbitrary code execution when processing an EPC Client update.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-94 | Improper Control of Generation of Code ('Code Injection') | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
References
URL | Source |
---|---|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0011 | PSIRT@sonicwall.com |
This website uses the NVD API, but is not approved or certified by it.