9.1
CVE-2024-12802
- EPSS 0.07%
- Published 09.01.2025 09:15:06
- Last modified 09.01.2025 15:15:14
- Source PSIRT@sonicwall.com
- Teams watchlist Login
- Open Login
SSL-VPN MFA Bypass in SonicWALL SSL-VPN can arise in specific cases due to the separate handling of UPN (User Principal Name) and SAM (Security Account Manager) account names when integrated with Microsoft Active Directory, allowing MFA to be configured independently for each login method and potentially enabling attackers to bypass MFA by exploiting the alternative account name.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorSonicWall
≫
Product
SonicOS
Default Statusunknown
Version
6.5.4.4-44v-21-2457 and older versions
Status
affected
Version
6.5.4.15-117n and older versions
Status
affected
Version
7.0.1-5161 and older versions
Status
affected
Version
7.1.1-7058 and older versions
Status
affected
Version
7.1.2-7019
Status
affected
Version
8.0.0-8035
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.07% | 0.218 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 9.1 | 3.9 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
CWE-305 Authentication Bypass by Primary Weakness
The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.