
CVE-2024-53703
https://notcve.org/view.php?id=CVE-2024-53703
05 Dec 2024 — A vulnerability in the SonicWall SMA100 SSLVPN firmware 10.2.1.13-72sv and earlier versions mod_httprp library loaded by the Apache web server allows remote attackers to cause Stack-based buffer overflow and potentially lead to code execution. • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0018 • CWE-121: Stack-based Buffer Overflow •

CVE-2024-53702
https://notcve.org/view.php?id=CVE-2024-53702
05 Dec 2024 — Use of cryptographically weak pseudo-random number generator (PRNG) vulnerability in the SonicWall SMA100 SSLVPN backup code generator that, in certain cases, can be predicted by an attacker, potentially exposing the generated secret. • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0018 • CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) •

CVE-2024-45319
https://notcve.org/view.php?id=CVE-2024-45319
05 Dec 2024 — A vulnerability in the SonicWall SMA100 SSLVPN firmware 10.2.1.13-72sv and earlier versions allows a remote authenticated attacker can circumvent the certificate requirement during authentication. A vulnerability in the SonicWall SMA100 SSLVPN firmware 10.2.1.13-72sv and earlier versions allows a remote authenticated attacker can circumvent the certificate requirement during authentication. • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0018 • CWE-798: Use of Hard-coded Credentials •

CVE-2024-45318
https://notcve.org/view.php?id=CVE-2024-45318
05 Dec 2024 — A vulnerability in the SonicWall SMA100 SSLVPN web management interface allows remote attackers to cause Stack-based buffer overflow and potentially lead to code execution. • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0018 • CWE-121: Stack-based Buffer Overflow •

CVE-2024-40763
https://notcve.org/view.php?id=CVE-2024-40763
05 Dec 2024 — Heap-based buffer overflow vulnerability in the SonicWall SMA100 SSLVPN due to the use of strcpy. This allows remote authenticated attackers to cause Heap-based buffer overflow and potentially lead to code execution. • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0018 • CWE-122: Heap-based Buffer Overflow •

CVE-2021-20050
https://notcve.org/view.php?id=CVE-2021-20050
23 Dec 2021 — An Improper Access Control Vulnerability in the SMA100 series leads to multiple restricted management APIs being accessible without a user login, potentially exposing configuration meta-data. Una vulnerabilidad de control de acceso inapropiado en la serie SMA100 conlleva a que varias API de administración restringidas sean accesibles sin un inicio de sesión de usuario, exponiendo potencialmente los metadatos de configuración • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0031 • CWE-284: Improper Access Control •

CVE-2021-20049
https://notcve.org/view.php?id=CVE-2021-20049
23 Dec 2021 — A vulnerability in SonicWall SMA100 password change API allows a remote unauthenticated attacker to perform SMA100 username enumeration based on the server responses. This vulnerability impacts 10.2.1.2-24sv, 10.2.0.8-37sv and earlier 10.x versions. Una vulnerabilidad en la API de cambio de contraseña de SonicWall SMA100, permite a un atacante remoto no autenticado llevar a cabo una enumeración de nombres de usuario de SMA100 basándose en las respuestas del servidor. Esta vulnerabilidad afecta a las version... • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0030 • CWE-203: Observable Discrepancy CWE-204: Observable Response Discrepancy •

CVE-2021-3449 – NULL pointer deref in signature_algorithms processing
https://notcve.org/view.php?id=CVE-2021-3449
25 Mar 2021 — An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS c... • https://github.com/riptl/cve-2021-3449 • CWE-476: NULL Pointer Dereference •

CVE-2021-3450 – CA certificate check bypass with X509_V_FLAG_X509_STRICT
https://notcve.org/view.php?id=CVE-2021-3450
25 Mar 2021 — The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectivel... • http://www.openwall.com/lists/oss-security/2021/03/27/1 • CWE-295: Improper Certificate Validation •

CVE-2021-20018
https://notcve.org/view.php?id=CVE-2021-20018
13 Mar 2021 — A post-authenticated vulnerability in SonicWall SMA100 allows an attacker to export the configuration file to the specified email address. This vulnerability impacts SMA100 version 10.2.0.5 and earlier. Una vulnerabilidad posterior a una autenticación en SonicWall SMA100, permite a un atacante exportar el archivo de configuración a la dirección de correo electrónico especificada. Esta vulnerabilidad afecta a SMA100 versiones 10.2.0.5 y anteriores • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0005 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-287: Improper Authentication •