Vulnerability Description
Heap-based buffer overflow vulnerability in the SonicWall SMA100 SSLVPN due to the use of strcpy. This allows remote authenticated attackers to cause Heap-based buffer overflow and potentially lead to code execution.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sonicwall | Sma 200 Firmware | < 10.2.1.14-75sv |
| Sonicwall | Sma 200 | - |
| Sonicwall | Sma 210 Firmware | < 10.2.1.14-75sv |
| Sonicwall | Sma 210 | - |
| Sonicwall | Sma 400 Firmware | < 10.2.1.14-75sv |
| Sonicwall | Sma 400 | - |
| Sonicwall | Sma 410 Firmware | < 10.2.1.14-75sv |
| Sonicwall | Sma 410 | - |
| Sonicwall | Sma 500V Firmware | < 10.2.1.14-75sv |
| Sonicwall | Sma 500V | - |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2024-40763?
CVE-2024-40763 is a vulnerability with a CVSS score of 7.5 (HIGH). Heap-based buffer overflow vulnerability in the SonicWall SMA100 SSLVPN due to the use of strcpy. This allows remote authenticated attackers to cause Heap-based buffer overflow and potentially lead to...
How severe is CVE-2024-40763?
CVE-2024-40763 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-40763?
Check the references section above for vendor advisories and patch information. Affected products include: Sonicwall Sma 200 Firmware, Sonicwall Sma 200, Sonicwall Sma 210 Firmware, Sonicwall Sma 210, Sonicwall Sma 400 Firmware.