2024-12-08 03:06:42 +00:00

60 lines
2.0 KiB
JSON

{
"id": "CVE-2024-45316",
"sourceIdentifier": "PSIRT@sonicwall.com",
"published": "2024-10-11T13:15:16.010",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Improper link resolution before file access ('Link Following') vulnerability in SonicWall Connect Tunnel (version 12.4.3.271 and earlier of Windows client) allows users with standard privileges to delete arbitrary folders and files, potentially leading to local privilege escalation attack."
},
{
"lang": "es",
"value": "La vulnerabilidad de resoluci\u00f3n de enlace incorrecta antes del acceso al archivo ('Seguimiento de enlace') en SonicWall Connect Tunnel (versi\u00f3n 12.4.3.271 y anteriores del cliente de Windows) permite a los usuarios con privilegios est\u00e1ndar eliminar carpetas y archivos arbitrarios, lo que potencialmente conduce a un ataque de escalada de privilegios locales."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "PSIRT@sonicwall.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"references": [
{
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0017",
"source": "PSIRT@sonicwall.com"
}
]
}