CVE-2024-45315
SonicWALL Connect Tunnel Link Following Denial-of-Service Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The Improper link resolution before file access ('Link Following') vulnerability in SonicWall Connect Tunnel (version 12.4.3.271 and earlier of Windows client) allows users with standard privileges to create arbitrary folders and files, potentially leading to local Denial of Service (DoS) attack.
This vulnerability allows local attackers to create a denial-of-service condition on affected installations of SonicWALL Connect Tunnel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the SonicWall VPN. By creating a symbolic link, an attacker can abuse the application to create a file. An attacker can leverage this vulnerability to create a persistent denial-of-service condition on the host system.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-08-26 CVE Reserved
- 2024-10-11 CVE Published
- 2024-10-18 EPSS Updated
- 2024-11-01 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-59: Improper Link Resolution Before File Access ('Link Following')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0017 | 2024-11-01 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
SonicWall Search vendor "SonicWall" | Connect Tunnel Search vendor "SonicWall" for product "Connect Tunnel" | 12.4.3.271 Search vendor "SonicWall" for product "Connect Tunnel" and version "12.4.3.271" | en |
Affected
|