Vulnerability in SonicWall SMA100 NetExtender Windows (32 and 64-bit) client 10.2.339 and earlier versions allows an attacker to arbitrary code execution when processing an EPC Client update.
History

Wed, 27 Nov 2024 05:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:sonicwall:netextender:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}


Tue, 10 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Sonicwall
Sonicwall netextender
CPEs cpe:2.3:a:sonicwall:netextender:*:*:*:*:*:windows:*:*
Vendors & Products Sonicwall
Sonicwall netextender
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: sonicwall

Published: 2024-07-18T07:37:12.258Z

Updated: 2024-11-27T04:55:16.232Z

Reserved: 2024-03-14T03:29:41.180Z

Link: CVE-2024-29014

cve-icon Vulnrichment

Updated: 2024-08-02T01:03:51.738Z

cve-icon NVD

Status : Modified

Published: 2024-07-18T08:15:02.173

Modified: 2024-11-21T09:07:22.613

Link: CVE-2024-29014

cve-icon Redhat

No data.