{"uuid": "ff9a96b8-41b6-43fe-b430-913aad09c4c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "name": "SonicWall SMA100 SSL-VPN Affected By Multiple Vulnerabilities", "description": "# Security Advisory\n\n\n\n# SonicWall SMA100 SSL-VPN Affected By Multiple Vulnerabilities\n\n9.8\n\nOverview\n\n<table data-v-4029ed70=\"\"><tbody data-v-4029ed70=\"\"><tr data-v-4029ed70=\"\"><td data-v-4029ed70=\"\" class=\"item-title\">Advisory ID</td><td data-v-4029ed70=\"\" class=\"item-content\">SNWLID-2024-0018</td></tr><tr data-v-4029ed70=\"\"><td data-v-4029ed70=\"\" class=\"item-title\">First Published</td><td data-v-4029ed70=\"\" class=\"item-content\">2024-12-03</td></tr><tr data-v-4029ed70=\"\"><td data-v-4029ed70=\"\" class=\"item-title\">Last Updated</td><td data-v-4029ed70=\"\" class=\"item-content\">2025-04-29</td></tr><tr data-v-4029ed70=\"\"><td data-v-4029ed70=\"\" class=\"item-title\">Workaround</td><td data-v-4029ed70=\"\" class=\"item-content\">false</td></tr><tr data-v-4029ed70=\"\"><td data-v-4029ed70=\"\" class=\"item-title\">Status</td><td data-v-4029ed70=\"\" class=\"item-content\">Applicable</td></tr><tr data-v-4029ed70=\"\"><td data-v-4029ed70=\"\" class=\"item-title\">CVE</td><td data-v-4029ed70=\"\" class=\"item-content\">CVE-2024-38475, CVE-2024-40763, CVE-2024-45318, CVE-2024-45319, CVE-2024-53702, CVE-2024-53703</td></tr><tr data-v-4029ed70=\"\"><td data-v-4029ed70=\"\" class=\"item-title\">CWE</td><td data-v-4029ed70=\"\" class=\"item-content\">CWE-35, CWE-121, CWE-122, CWE-798, CWE-338</td></tr><tr data-v-4029ed70=\"\"><td data-v-4029ed70=\"\" class=\"item-title\">CVSS v3</td><td data-v-4029ed70=\"\" class=\"item-content\">9.8</td></tr><tr data-v-4029ed70=\"\"><td data-v-4029ed70=\"\" class=\"item-title\">CVSS Vector</td><td data-v-4029ed70=\"\" class=\"item-content\">CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</td></tr><tr data-v-4029ed70=\"\"><td data-v-4029ed70=\"\" class=\"item-title\">Direct Link</td><td data-v-4029ed70=\"\" class=\"item-content\"><a data-v-4029ed70=\"\" href=\"/vuln-detail/SNWLID-2024-0018\"><span data-v-4029ed70=\"\" class=\"sw-icon\" style=\"width: 18px; height: 18px; transform: rotate(0deg);\"><span data-v-4029ed70=\"\" class=\"sw-icon__inner sw-font-icon icon-link\" style=\"font-size: 18px;\"></span></span></a></td></tr></tbody></table>\n\nSummary\n\n1.  Path traversal vulnerability \u2013 attributed to publicly known Apache HTTP Server vulnerability (CVE-2024-38475)\n\nImproper escaping of output in mod\\_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to file system locations that are permitted to be served by the server.\n\nCVSS Score: 9.8\u00a0  \nCVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H  \nCWE-35: Path traversal vulnerability\n\n2.  CVE-2024-40763 - SonicWALL SMA100 Heap-based buffer overflow vulnerability\n\nHeap-based buffer overflow vulnerability in the SonicWall SMA100 SSLVPN due to the use of strcpy. This allows remote authenticated attackers to cause Heap-based buffer overflow and potentially lead to code execution.\n\nCVSS Score: 7.5  \nCVSS Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H  \nCWE-122: Heap-based Buffer Overflow\n\n3.  CVE-2024-45318 - Stack-based buffer overflow vulnerability\n\nA vulnerability in the SonicWall SMA100 SSLVPN web management interface allows remote attackers to cause Stack-based buffer overflow and potentially lead to code execution.\n\nCVSS Score: 8.1  \nCVSS Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H  \nCWE-121: Stack-based Buffer Overflow\n\n4.  CVE-2024-45319 - Certificate-based authentication bypass\n\nA vulnerability in the SonicWall SMA100 SSLVPN allows a remote authenticated attacker can circumvent the certificate requirement during authentication.\n\nCVSS Score: 6.3  \nCVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L  \nCWE-798: Use of Hard-coded Credentials\n\n5.  CVE-2024-53702 - Insecure randomness\n\nUse of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in the SonicWall SMA100 SSLVPN backup code generator that, in certain cases, can be predicted by an attacker, potentially exposing the generated secret.\n\nCVSS Score: 5.3  \nCVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N  \nCWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)\n\n6.  CVE-2024-53703 - Stack-based buffer overflow vulnerability\n\nA vulnerability in the SonicWall SMA100 SSLVPN mod\\_httprp library loaded by the Apache web server allows remote attackers to cause Stack-based buffer overflow and potentially lead to code execution.\n\nCVSS Score: 8.1  \nCVSS Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H  \nCWE-121: Stack-based Buffer Overflow\n\nSonicWall SSL VPN SMA1000 series products are not affected by these vulnerabilities.\n\nSonicWall strongly advises users of the SMA 100 series products (SMA 200, 210, 400, 410, and 500v) to upgrade to the mentioned fixed release version to address these vulnerabilities.\n\nAffected Product(s)\n\n<table class=\"MsoNormalTable\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\" width=\"85%\" style=\"width: 85.62%; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial; border: none;\"><tbody><tr><td width=\"38%\" valign=\"bottom\" style=\"width:38.16%;border:solid windowtext 1.0pt;\n  mso-border-alt:solid windowtext .5pt;background:#ED7D31;padding:0in 5.4pt 0in 5.4pt\"><p class=\"MsoNormal\" style=\"margin-bottom:0in;line-height:13.8pt;vertical-align:\n  baseline\"><b><span style=\"font-size:10.0pt;font-family:&quot;Arial&quot;,sans-serif;\n  mso-fareast-font-family:&quot;Times New Roman&quot;;color:white;border:none windowtext 1.0pt;\n  mso-border-alt:none windowtext 0in;padding:0in;mso-fareast-language:EN-IN\">Affected Product(s)</span></b></p></td><td width=\"61%\" valign=\"bottom\" style=\"width:61.84%;border:solid windowtext 1.0pt;\n  border-left:none;mso-border-left-alt:solid windowtext .5pt;mso-border-alt:\n  solid windowtext .5pt;background:#ED7D31;padding:0in 5.4pt 0in 5.4pt\"><p class=\"MsoNormal\" style=\"margin-bottom:0in;line-height:13.8pt;vertical-align:\n  baseline\"><b><span style=\"font-size:10.0pt;font-family:&quot;Arial&quot;,sans-serif;\n  mso-fareast-font-family:&quot;Times New Roman&quot;;color:white;border:none windowtext 1.0pt;\n  mso-border-alt:none windowtext 0in;padding:0in;mso-fareast-language:EN-IN\">Affected Versions</span></b><span style=\"font-size:10.0pt;font-family:&quot;Conv_AktivGroteskStdReg&quot;,serif;\n  mso-fareast-font-family:&quot;Times New Roman&quot;;mso-bidi-font-family:&quot;Times New Roman&quot;;\n  color:#101010;mso-fareast-language:EN-IN\"><o:p></o:p></span></p></td></tr><tr style=\"mso-yfti-irow:1;mso-yfti-lastrow:yes;height:20.35pt\"><td width=\"38%\" valign=\"bottom\" style=\"width:38.16%;border:solid windowtext 1.0pt;\n  border-top:none;mso-border-top-alt:solid windowtext .5pt;mso-border-alt:solid windowtext .5pt;\n  padding:0in 5.4pt 0in 5.4pt;height:20.35pt\"><p class=\"MsoNormal\" style=\"margin-bottom:0in;line-height:13.8pt;vertical-align:\n  baseline\"><b><span style=\"font-size: 10pt; font-family: Arial, sans-serif; border: 1pt none windowtext; padding: 0in;\">SMA 100 Series<br></span></b><i><span style=\"font-size: 10pt; font-family: Arial, sans-serif; border: 1pt none windowtext; padding: 0in;\">(SMA 200, 210, 400, 410, 500v)</span></i><span style=\"font-size:12.0pt;font-family:\n  &quot;Conv_AktivGroteskStdReg&quot;,serif;mso-fareast-font-family:&quot;Times New Roman&quot;;\n  mso-bidi-font-family:&quot;Times New Roman&quot;;color:#101010;mso-fareast-language:\n  EN-IN\"><o:p></o:p></span></p></td><td width=\"61%\" valign=\"bottom\" style=\"width:61.84%;border-top:none;border-left:\n  none;border-bottom:solid windowtext 1.0pt;border-right:solid windowtext 1.0pt;\n  mso-border-top-alt:solid windowtext .5pt;mso-border-left-alt:solid windowtext .5pt;\n  mso-border-alt:solid windowtext .5pt;padding:0in 5.4pt 0in 5.4pt;height:20.35pt\"><p class=\"MsoNormal\" style=\"margin-bottom:0in;text-align:justify;line-height:\n  13.8pt;vertical-align:baseline\"><span style=\"font-size: 10pt; font-family: Arial, sans-serif;\">10.2.1.13-72sv and earlier versions.<o:p></o:p></span></p></td></tr></tbody><tbody></tbody><tbody></tbody></table>\n\n_SonicWall SSL VPN SMA1000 series products are not affected by these vulnerabilities._\n\nCPE(s)\n\nWorkaround\n\nNone\n\nFixed Software\n\n<table class=\"MsoNormalTable\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\" width=\"85%\" style=\"width: 85.62%; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial; border: none;\"><tbody><tr><td width=\"38%\" valign=\"bottom\" style=\"width:38.16%;border:solid windowtext 1.0pt;\n  mso-border-alt:solid windowtext .5pt;background:#ED7D31;padding:0in 5.4pt 0in 5.4pt\"><p class=\"MsoNormal\" style=\"margin-bottom:0in;line-height:13.8pt;vertical-align:\n  baseline\"><b><span style=\"font-size:10.0pt;font-family:&quot;Arial&quot;,sans-serif;\n  mso-fareast-font-family:&quot;Times New Roman&quot;;color:white;border:none windowtext 1.0pt;\n  mso-border-alt:none windowtext 0in;padding:0in;mso-fareast-language:EN-IN\">Fixed Product(s)</span></b></p></td><td width=\"61%\" valign=\"bottom\" style=\"width:61.84%;border:solid windowtext 1.0pt;\n  border-left:none;mso-border-left-alt:solid windowtext .5pt;mso-border-alt:\n  solid windowtext .5pt;background:#ED7D31;padding:0in 5.4pt 0in 5.4pt\"><p class=\"MsoNormal\" style=\"margin-bottom:0in;line-height:13.8pt;vertical-align:\n  baseline\"><b><span style=\"font-size:10.0pt;font-family:&quot;Arial&quot;,sans-serif;\n  mso-fareast-font-family:&quot;Times New Roman&quot;;color:white;border:none windowtext 1.0pt;\n  mso-border-alt:none windowtext 0in;padding:0in;mso-fareast-language:EN-IN\">Fixed Versions</span></b><span style=\"font-size:10.0pt;font-family:&quot;Conv_AktivGroteskStdReg&quot;,serif;\n  mso-fareast-font-family:&quot;Times New Roman&quot;;mso-bidi-font-family:&quot;Times New Roman&quot;;\n  color:#101010;mso-fareast-language:EN-IN\"><o:p></o:p></span></p></td></tr><tr style=\"mso-yfti-irow:1;mso-yfti-lastrow:yes;height:20.35pt\"><td width=\"38%\" valign=\"bottom\" style=\"width:38.16%;border:solid windowtext 1.0pt;\n  border-top:none;mso-border-top-alt:solid windowtext .5pt;mso-border-alt:solid windowtext .5pt;\n  padding:0in 5.4pt 0in 5.4pt;height:20.35pt\"><p class=\"MsoNormal\" style=\"margin-bottom:0in;line-height:13.8pt;vertical-align:\n  baseline\"><b><span style=\"font-size: 10pt; font-family: Arial, sans-serif; border: 1pt none windowtext; padding: 0in;\">SMA 100 Series<br></span></b><i><span style=\"font-size: 10pt; font-family: Arial, sans-serif; border: 1pt none windowtext; padding: 0in;\">(SMA 200, 210, 400, 410, 500v)</span></i><span style=\"font-size:12.0pt;font-family:\n  &quot;Conv_AktivGroteskStdReg&quot;,serif;mso-fareast-font-family:&quot;Times New Roman&quot;;\n  mso-bidi-font-family:&quot;Times New Roman&quot;;color:#101010;mso-fareast-language:\n  EN-IN\"><o:p></o:p></span></p></td><td width=\"61%\" valign=\"bottom\" style=\"width:61.84%;border-top:none;border-left:\n  none;border-bottom:solid windowtext 1.0pt;border-right:solid windowtext 1.0pt;\n  mso-border-top-alt:solid windowtext .5pt;mso-border-left-alt:solid windowtext .5pt;\n  mso-border-alt:solid windowtext .5pt;padding:0in 5.4pt 0in 5.4pt;height:20.35pt\"><p class=\"MsoNormal\" style=\"margin-bottom:0in;text-align:justify;line-height:\n  13.8pt;vertical-align:baseline\"><span style=\"font-size: 10pt; font-family: Arial, sans-serif;\">10.2.1.14-75sv and higher versions.<o:p></o:p></span></p></td></tr></tbody><tbody></tbody><tbody></tbody></table>\n\nComments\n\nDuring further analysis, SonicWall and trusted security partners identified an additional exploitation technique using CVE-2024-38475, through which unauthorized access to certain files could enable session hijacking. SMA100 devices updated with the fixed firmware version 10.2.1.14-75sv are not vulnerable to CVE-2024-38475 or the related session hijacking technique described.\n\n**Note: This is potentially being exploited in the wild.**\n\n**SonicWall PSIRT recommends that customers review their SMA devices to ensure no unauthorized logins.**\n\nCredit(s)\n\nAlain Mowat of Orange Cyberdefense, Switzerland.\n\nRevision History\n\n*   Version\n    \n*   1.0\n    \n*   Date\n    \n*   04-Dec-2024\n    \n*   Description\n    \n*   Initial Release.\n    \n\n\\---------------------------------------\n\n*   Version\n    \n*   1.1\n    \n*   Date\n    \n*   05-Dec-2024\n    \n*   Description\n    \n*   Updated credit(s) section - Included vulnerability researcher name.\n    \n\n\\---------------------------------------\n\n*   Version\n    \n*   1.2\n    \n*   Date\n    \n*   29-Apr-2025\n    \n*   Description\n    \n*   Comment added - During further analysis, SonicWall and trusted security partners identified an additional exploitation technique using CVE-2024-38475, through which unauthorized access to certain files could enable session hijacking. SMA100 devices updated with the fixed firmware version 10.2.1.14-75sv are not vulnerable to CVE-2024-38475 or the related session hijacking technique described\n    \n\n# Reference(s)\n\nSource [https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0018](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0018)", "creation_timestamp": "2025-05-05T07:56:53.581572+00:00", "timestamp": "2025-05-05T07:56:53.581572+00:00", "related_vulnerabilities": ["CVE-2024-40763", "CVE-2024-45318", "CVE-2024-38475", "CVE-2024-45319", "CVE-2024-53702", "CVE-2024-53703"], "author": {"login": "adulau", "name": "Alexandre Dulaunoy", "uuid": "c933734a-9be8-4142-889e-26e95c752803"}}
