CVE-2024-29014

Vulnerability in SonicWall SMA100 NetExtender Windows (32 and 64-bit) client 10.2.339 and earlier versions allows an attacker to arbitrary code execution when processing an EPC Client update.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:sonicwall:netextender:*:*:*:*:*:windows:*:*

History

10 Sep 2024, 14:12

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.1
v2 : unknown
v3 : 8.8
First Time Sonicwall
Sonicwall netextender
References () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0011 - () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0011 - Vendor Advisory
CPE cpe:2.3:a:sonicwall:netextender:*:*:*:*:*:windows:*:*

01 Aug 2024, 13:49

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
Summary
  • (es) Una vulnerabilidad en el cliente SonicWall SMA100 NetExtender Windows (32 y 64 bits) 10.2.339 y versiones anteriores permite a un atacante ejecutar código arbitrario al procesar una actualización del cliente EPC.

18 Jul 2024, 17:15

Type Values Removed Values Added
Summary (en) Vulnerability in SonicWall NetExtender Windows (32 and 64-bit) client 10.2.339 and earlier versions allows an attacker to arbitrary code execution when processing an EPC Client update. (en) Vulnerability in SonicWall SMA100 NetExtender Windows (32 and 64-bit) client 10.2.339 and earlier versions allows an attacker to arbitrary code execution when processing an EPC Client update.

18 Jul 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-18 08:15

Updated : 2024-09-10 14:12


NVD link : CVE-2024-29014

Mitre link : CVE-2024-29014

CVE.ORG link : CVE-2024-29014


JSON object : View

Products Affected

sonicwall

  • netextender
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')