Attackers Can Execute Arbitrary Code via SonicWall NetExtender Client Update
CVE-2024-29014

8.8HIGH

Key Information:

Vendor
Sonicwall
Vendor
CVE Published:
18 July 2024

Badges

πŸ“° News Worthy

Summary

The SonicWall NetExtender client update vulnerability (CVE-2024-29014) allows attackers to execute arbitrary code, while the Palo Alto Networks GlobalProtect App vulnerability (CVE-2024-5921) allows for remote code execution and privilege escalation. These vulnerabilities can be exploited to achieve remote code execution. Both vendors have released patches to address these vulnerabilities. While the exploits have not been exploited by ransomware groups, the potential impact of the vulnerabilities is significant, as attackers could install malicious software and compromise systems. The release of NachoVPN, an open-source tool that simulates rogue VPN servers capable of exploiting these and other vulnerabilities, highlights the urgency of addressing these vulnerabilities.

Affected Version(s)

NetExtender Windows 10.2.339 and earlier versions

News Articles

Researchers reveal exploitable flaws in corporate VPN clients - Help Net Security

Vulnerabilities in Palo Alto Networks' (CVE-2024-5921) and SonicWall (CVE-2024-29014) corporate VPN clients can be exploited to achieve RCE.

1 month ago

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ“°

    First article discovered by Help Net Security

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database1 News Article(s)
.