CVE-2024-53705

high

Description

A Server-Side Request Forgery vulnerability in the SonicOS SSH management interface allows a remote attacker to establish a TCP connection to an IP address on any port when the user is logged in to the firewall.

References

https://www.securityweek.com/sonicwall-patches-authentication-bypass-vulnerabilities-in-firewalls/

https://www.bleepingcomputer.com/news/security/sonicwall-urges-admins-to-patch-exploitable-sslvpn-bug-immediately/

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003

Details

Source: Mitre, NVD

Published: 2025-01-09

Updated: 2025-01-09

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Severity: High