Use of cryptographically weak pseudo-random number generator (PRNG) vulnerability in the SonicWall SMA100 SSLVPN backup code generator that, in certain cases, can be predicted by an attacker, potentially exposing the generated secret.
References
| Link | Resource |
|---|---|
| https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0018 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
History
04 Nov 2025, 17:13
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0018 - Vendor Advisory | |
| CPE | cpe:2.3:o:sonicwall:sma_410_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:sonicwall:sma_200:-:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_210_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:sonicwall:sma_400:-:*:*:*:*:*:*:* cpe:2.3:h:sonicwall:sma_410:-:*:*:*:*:*:*:* cpe:2.3:h:sonicwall:sma_210:-:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_500v_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_200_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_400_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:sonicwall:sma_500v:-:*:*:*:*:*:*:* |
|
| First Time |
Sonicwall sma 410
Sonicwall sma 210 Sonicwall sma 410 Firmware Sonicwall sma 200 Sonicwall sma 500v Sonicwall sma 500v Firmware Sonicwall Sonicwall sma 200 Firmware Sonicwall sma 400 Sonicwall sma 400 Firmware Sonicwall sma 210 Firmware |
05 Dec 2024, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-12-05 14:15
Updated : 2025-11-04 17:13
NVD link : CVE-2024-53702
Mitre link : CVE-2024-53702
CVE.ORG link : CVE-2024-53702
JSON object : View
Products Affected
sonicwall
- sma_210_firmware
- sma_200
- sma_500v_firmware
- sma_200_firmware
- sma_400
- sma_410_firmware
- sma_410
- sma_400_firmware
- sma_500v
- sma_210
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
