9.1
CVE-2024-12802
- EPSS 0.07%
- Veröffentlicht 09.01.2025 09:15:06
- Zuletzt bearbeitet 09.01.2025 15:15:14
- Quelle PSIRT@sonicwall.com
- Teams Watchlist Login
- Unerledigt Login
SSL-VPN MFA Bypass in SonicWALL SSL-VPN can arise in specific cases due to the separate handling of UPN (User Principal Name) and SAM (Security Account Manager) account names when integrated with Microsoft Active Directory, allowing MFA to be configured independently for each login method and potentially enabling attackers to bypass MFA by exploiting the alternative account name.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerSonicWall
≫
Produkt
SonicOS
Default Statusunknown
Version
6.5.4.4-44v-21-2457 and older versions
Status
affected
Version
6.5.4.15-117n and older versions
Status
affected
Version
7.0.1-5161 and older versions
Status
affected
Version
7.1.1-7058 and older versions
Status
affected
Version
7.1.2-7019
Status
affected
Version
8.0.0-8035
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.07% | 0.218 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 9.1 | 3.9 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
CWE-305 Authentication Bypass by Primary Weakness
The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.