December 6, 2024 at 07:30AM
SonicWall released urgent patches for multiple high-severity vulnerabilities in the SMA100 SSL-VPN gateway, including buffer overflow flaws (CVE-2024-45318, CVE-2024-53703) allowing remote code execution, a path traversal issue (CVE-2024-38475), and an authentication bypass (CVE-2024-45319). Users must update to firmware version 10.2.1.14-75sv.
### Meeting Takeaways: SonicWall Security Vulnerabilities Update
1. **Vulnerability Announcement**:
– SonicWall has released patches for multiple vulnerabilities in the SMA100 SSL-VPN secure access gateway.
2. **Key Vulnerabilities**:
– **CVE-2024-45318 & CVE-2024-53703**:
– Severity: High (CVSS score of 8.1)
– Type: Buffer overflow bugs leading to potential remote code execution (RCE).
– Affected Components: Web management interface and a library loaded by the Apache web server.
– **CVE-2024-40763**:
– Type: Heap-based buffer overflow due to the use of the ‘strcpy’ function.
– Note: Requires authentication for exploitation.
– **CVE-2024-38475**:
– Type: Path traversal flaw in Apache HTTP Server.
– Impact: Allows attackers to map URLs to file system locations.
– **CVE-2024-45319**:
– Type: Authentication bypass vulnerability.
– Impact: Allows remote, authenticated attackers to bypass certificate requirements.
– **CVE-2024-53702**:
– Issue: Weak cryptographically pseudo-random number generator (PRNG) in the SMA100 SSLVPN backup code generator.
3. **Affected Products**:
– Vulnerabilities affect SMA 100 series appliances running firmware version 10.2.1.13-72sv and earlier.
– Patched in firmware version 10.2.1.14-75sv.
– SMA1000 SSL VPN series products are not affected.
4. **Exploitation Status**:
– SonicWall reports no evidence of these vulnerabilities being exploited in the wild.
5. **Action Required**:
– Users are strongly advised to update their appliances promptly to mitigate risks, as previous SonicWall vulnerabilities have been targeted by attackers.
### Conclusion:
Immediate updates to the SMA100 SSL-VPN secure access gateway are essential to protect against potential exploitation of the identified vulnerabilities.