Stack-Based Buffer Overflow in SonicWall Capture Client and NetExtender Client
CVE-2023-6340
5.5MEDIUM
Summary
The sfpmonitor.sys driver in SonicWall's Capture Client and NetExtender client is susceptible to a stack-based buffer overflow. This vulnerability can be exploited to trigger denial-of-service conditions, impacting system availability. Users are encouraged to update their software to mitigate potential risks associated with this vulnerability.
Affected Version(s)
Capture Client Windows 3.7.10 and earlier versions
NetExtender Windows 10.2.337 and earlier versions
References
CVSS V3.1
Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published