Document
Multiple Vulnerabilities Found in SonicWall SSL-VPN SMA1000 and Connect Tunnel Windows Client

Multiple Vulnerabilities Found in SonicWall SSL-VPN SMA1000 and Connect Tunnel Windows Client

SonicWall has released security updates to address multiple vulnerabilities affecting its SMA 1000 series SSL-VPN appliances and the associated Connec

Related articles

Tamilyogi Guide: Explore Easy Streaming of Top Films and Series 如何進行 iPhone VPN 設定?詳細教程及虛擬定位推薦 Keto Cheese Bread How to Setup VPN on Huawei Router [Easy Guide] Tor vs. VPN: Is One Better than the Other?

SonicWall has released security updates to address multiple vulnerabilities affecting its SMA 1000 series SSL-VPN appliances and the associated Connect Tunnel Windows client. These flaws could allow attackers to launch denial-of-service attacks, escalate privileges, and even execute arbitrary code on vulnerable systems.

The vulnerabilities, discovered by security researchers Hashim Jawad and Wenjie Zhong, are detailed in a recent SonicWall security advisory. The most severe of these is CVE-2024-45316, a “link follow Local Privilege Escalation Vulnerability” with a CVSS score of 7.8. This vulnerability allows attackers with standard user privileges to “delete arbitrary folder and file,” potentially leading to complete control of the system.

The Improper link resolution before file access (‘link follow’) vulnerability in SonicWall Connect Tunnel (version 12.4.271 and earlier of Windows client) allows users with standard privileges to delete arbitrary folder and file, potentially leading to local privilege escalation attack, ” the advisory state .

Another critical flaw, CVE-2024-45317, is an “unauthenticated SMA1000 12.4.x Server – Side request forgery ( SSRF ) vulnerability” with a CVSS score of 7.2 . This vulnerability is enables enable attacker to “cause the server-side application to make requests to an unintended IP address,” potentially exposing sensitive internal resources or facilitating further attacks.

The third vulnerability, tracked as CVE-2024-45315, affects the Windows client of SonicWall Connect Tunnel, particularly version 12.4.271 and earlier. This flaw is rooted in improper link resolution before file access, commonly referred to as a ‘link follow‘ vulnerability. It allows attackers with standard privileges to create arbitrary folders and files, which could result in a local Denial-of-Service (DoS) attack.

While SonicWall has not yet observed any active exploitation of these vulnerabilities in the wild, the company “strongly advises SSLVPN SMA 1000 series product and Connect Tunnel client users to upgrade to the mentioned fixed-release version.” This includes upgrading the SMA1000 Connect Tunnel Windows client to version 12.4.3.281 or higher and applying the SMA1000 Platform Hotfix – 12.4.3-02758 to affected appliances.

It’s important to note that these vulnerabilities do not affect the SMA 100 series products, Connect Tunnel Linux clients, or Connect Tunnel Mac clients.

relate Posts :