7.2
CVE-2024-12805
- EPSS 0.46%
- Published 09.01.2025 08:15:26
- Last modified 17.01.2025 03:15:07
- Source PSIRT@sonicwall.com
- Teams watchlist Login
- Open Login
A post-authentication format string vulnerability in SonicOS management allows a remote attacker to crash a firewall and potentially leads to code execution.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorSonicWall
≫
Product
SonicOS
Default Statusunknown
Version
6.5.4.15-117n and older versions
Status
affected
Version
7.0.1-5161 and older version
Status
affected
Version
7.1.2-7019
Status
affected
Version
8.0.0-8035
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.46% | 0.634 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-134 Use of Externally-Controlled Format String
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.