AI description
CVE-2024-53704 is an authentication bypass vulnerability found in the SSL VPN component of SonicWall firewalls running the SonicOS operating system. This flaw allows unauthorized remote attackers to bypass the authentication mechanism and gain access to the network. The vulnerability exists due to improper authentication within the SSLVPN component. Exploitation attempts targeting this vulnerability began shortly after the public release of proof-of-concept exploit code on February 10, 2025. Patches for CVE-2024-53704 have been available since January 7, 2024. Federal Civilian Executive Branch agencies are mandated to address this vulnerability by March 11, 2025.
- Description
- An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication.
- Source
- PSIRT@sonicwall.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Data from CISA
- Vulnerability name
- SonicWall SonicOS SSLVPN Improper Authentication Vulnerability
- Exploit added on
- Feb 18, 2025
- Exploit action due
- Mar 11, 2025
- Required action
- Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
- PSIRT@sonicwall.com
- CWE-287
- Hype score
- Not currently trending
.@bishopfox doesn't just report vulns—we help our customers stay ahead. Our researchers exploited #SonicWall CVE-2024-53704, critical auth bypass that allows remote, unauthenticated session hijacking. Full details: https://t.co/mgQMzKWU7q https://t.co/XqkHsrtkzV
@behkfox
28 Feb 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall has released security updates addressing a critical vulnerability (CVE-2024-53704) affecting their SonicOS software. Users and administrators of affected products are advised to update to the latest versions immediately. Read the alert here: https://t.co/41Qcn1u5gY ht
@CSAsingapore
25 Feb 2025
104 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#exploit 1. macOS PackageKit Exploits https://t.co/REhVEuqtU6 2. CVE-2024-53704: SonicWall SSL VPN Session Hijacking https://t.co/JpSb5kZVnZ 3. CVE-2024-54527: MediaLibraryService Full TCC Bypass, Dive Deep into AMFI https://t.co/62vbuwlVrw
@akaclandestine
21 Feb 2025
280 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
Cuidado com a CVE-2024-53704! A vulnerabilidade no SonicOS permite que atacantes acessem redes internas sem autenticação. Atualize seu firmware e implemente MFA para proteger seus dados. O prazo da CISA é até 11/03/2025. Não fique vulnerável!
@IncursioHack
19 Feb 2025
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
The SonicWall VPN vulnerability (CVE-2024-53704) is a critical 9.8/10 threat. With proof-of-concept public, patching is urgent to protect 4,500+ endpoints. Cybersecurity is a business priority—act now. #CyberResilience #ZeroTrust #PatchManagement https://t.co/6N5SXvKukF https://t
@nabeelmahmood
19 Feb 2025
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨Critical vulnerabilities in Palo Alto Networks PAN-OS (CVE-2025-0108) & SonicWall SonicOS SSLVPN (CVE-2024-53704) are being actively exploited! ⚠️ Exploits traced to U.S., Germany & Netherlands ⚠️ Patch NOW before it’s too late! #CyberSecurity #CISA https://t.co/3sO307
@syberintel
19 Feb 2025
53 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 Two critical vulnerabilities in Palo Alto Networks PAN-OS and SonicWall SonicOS SSLVPN are actively exploited, now added to CISA's KEV catalog. CVE-2025-0108 allows unauthenticated attackers to bypass PAN-OS security, while CVE-2024-53704 compromises SSLVPN authentication.… h
@TheHackersNews
19 Feb 2025
38323 Impressions
48 Retweets
108 Likes
15 Bookmarks
6 Replies
2 Quotes
🛡️ We added Palo Alto PAN-OS, CVE-2025-0108 & SonicWall SonicOS, CVE-2024-53704 to our Known Exploited Vulnerabilities Catalog. Visit https://t.co/myxOwap1Tf & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec https://t.co/cucCemLnWZ
@CISACyber
18 Feb 2025
11451 Impressions
42 Retweets
79 Likes
10 Bookmarks
1 Reply
4 Quotes
SonicWall firewalls are under attack as CVE-2024-53704 is exploited in the wild following a PoC release. More details: 🔗 https://t.co/7NJOVLIQpp #CyberSecurity #Vulnerability
@adriananglin
18 Feb 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall Firewalls Under Attack: CVE-2024-53704 Exploited in the Wild, PoC Released https://t.co/A7dIn70DZ0
@Dinosn
18 Feb 2025
1688 Impressions
3 Retweets
3 Likes
2 Bookmarks
0 Replies
0 Quotes
🚨🚨SonicWall Firewalls Under Attack: CVE-2024-53704 Exploited in the Wild ⚠️Attackers are leveraging this vulnerability to gain unauthorized access to networks, potentially leading to data breaches, ransomware deployment, and other malicious activities. ZoomEye… https://t.co/uz
@zoomeye_team
18 Feb 2025
785 Impressions
7 Retweets
12 Likes
1 Bookmark
0 Replies
0 Quotes
Unpacking the SonicWall Firewall Vulnerability: CVE-2024-53704 https://t.co/QbEZsXeHEi #sonicwall #cve202453704 #firewallvulnerability #networksecurity #cybersecurity #vpnsecurity #patchmanagement #infosec #cyberthreats
@DefendOpsHQ
18 Feb 2025
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#exploit 1. macOS PackageKit Exploits https://t.co/zx4w5Y8Mrh 2. CVE-2024-53704: SonicWall SSL VPN Session Hijacking https://t.co/30mzp4qbep 3. CVE-2024-54527: MediaLibraryService Full TCC Bypass, Dive Deep into AMFI https://t.co/LkTNEQz3jx
@ksg93rd
17 Feb 2025
239 Impressions
2 Retweets
5 Likes
0 Bookmarks
0 Replies
0 Quotes
🔴 Una falla de seguridad en los firewalls de SonicWall (CVE-2024-53704) encontrada en el mecanismo de autenticación SSLVPN, afecta a las versiones 7.1.x (hasta 7.1.1-7058), 7.1.2-7019 y 8.0.0-8035, utilizadas en los modelos Gen 6, Gen 7 y dispositivos de la serie SOHO. 🧉 https
@MarquisioX
16 Feb 2025
40 Impressions
0 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
A critical authentication bypass vulnerability in SonicWall firewalls, identified as CVE-2024-53704, is currently being actively exploited in the wild. https://t.co/kVZpkmEJmT
@TAAUSLLC
16 Feb 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔥 SonicWall Firewall Vulnerability Exploited in the Wild Read more: https://t.co/gVyvgOjSGp 📌 Vulnerability tracked as CVE-2024-53704, being actively exploited in the wild. 📌 Successful exploitation bypasses multi-factor authentication (MFA). #cybersecurity
@gbhackers_news
16 Feb 2025
76 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
🔥 SonicWall Firewall Vulnerability Exploited in the Wild | Read more: https://t.co/XTiofAIBCR 📌 Vulnerability tracked as CVE-2024-53704, being actively exploited in the wild. 📌 Successful exploitation bypasses multi-factor authentication (MFA). 📌 Historically, these types of
@The_Cyber_News
16 Feb 2025
532 Impressions
3 Retweets
5 Likes
0 Bookmarks
0 Replies
0 Quotes
A critical CVE-2024-53704 vulnerability in SonicWall firewalls is being exploited, allowing unauthorized access via SSL VPN. Urgent firmware upgrades are necessary to mitigate risks. 🔒 #SonicWall #VPNHacks #USA link: https://t.co/8rDUvPNe5S https://t.co/YkrY4mDjXz
@TweetThreatNews
15 Feb 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Vulnerability Alert: SonicWall Firewall Authentication Bypass Vulnerability 📅 Timeline: Disclosure: 2024-11-05, Patch: 2025-01-07 📌 Attribution: Bishop Fox 🆔cveId: CVE-2024-53704 📊baseScore: 9.8 📏cvssMetrics: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvssSeverity: Critical…
@syedaquib77
14 Feb 2025
22 Impressions
0 Retweets
1 Like
0 Bookmarks
1 Reply
0 Quotes
Urgent alert: A high-severity vulnerability (CVE-2024-53704) in SonicWall firewalls is being actively exploited, enabling authentication bypass. Many systems are at risk despite available patches. 🔒⚠️ #SonicWall #SSLVPN #USA link: https://t.co/J0zvLkH4Sj https://t.co/sv6JYltJf4
@TweetThreatNews
14 Feb 2025
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall VPN Exploit Lets Hackers Hijack Sessions! A critical flaw (CVE-2024-53704) allows attackers to hijack active VPN sessions without authentication! ⚠️ 4,500+ servers remain unpatched—public exploit code is out! Update firmware NOW! https://t.co/njpUe2A5Ii… https://t.co
@dCypherIO
13 Feb 2025
32 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-53704 impacts SonicWall #CVE-2024-53704 #Sonicwall https://t.co/wxLyasubHw
@pravin_karthik
13 Feb 2025
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Security researchers at Bishop Fox have released a full exploit for CVE-2024-53704, a critical authentication bypass flaw in SonicWall SSL VPN. Attackers can hijack active VPN sessions using a specially crafted session cookie, potentially gaining access to internal networks. http
@cyberbulletins
12 Feb 2025
30 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Bishop Fox researchers disclosed full exploit details for CVE-2024-53704, an authentication bypass in SonicOS SSLVPN. https://t.co/lrFhwdJuh5 #rhymtech #thinkcyberthinkrhym #rhymcyberupdates
@Rhym_Tech
12 Feb 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Jak w banalny sposób przejąć zalogowaną sesję użytkownika do VPN? ❌ Chodzi o krytyczną, niedawno załataną podatność w urządzeniach VPN SonicWall (CVE-2024-53704) Schemat ataku: ✅ Ofiara loguje się do VPNa (podaje login / hasło / być może kod 2FA) - czyli nic niestandardowego…
@Sekurak
11 Feb 2025
4807 Impressions
9 Retweets
44 Likes
12 Bookmarks
2 Replies
0 Quotes
🚨 Understanding #CVE-2024-53704: A Critical Flaw in SonicOS SSLVPN Exposed by Bishop Fox https://t.co/7j2B3ETSQX
@UndercodeNews
11 Feb 2025
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Bishop Fox security researchers have released detailed exploitation details for the CVE-2024-53704 vulnerability, which allows hackers to bypass authentication in certain versions of the SonicOS SSLVPN application. #security #sonicos https://t.co/17GDU94aAP
@Strivehawk
11 Feb 2025
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical SonicWall vulnerability CVE-2024-53704 allows hackers to hijack SSL VPN sessions. Immediate firmware updates are essential to mitigate risks. 🛡️🔒 #SonicWall #VPNSecurity #USA link: https://t.co/nrVdqosRn5 https://t.co/sVMVkhNefR
@TweetThreatNews
11 Feb 2025
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
.@bishopfox researchers exploited #SonicWall CVE-2024-53704, critical auth bypass that allows remote, unauthenticated session hijacking. Full details: https://t.co/gGX9VVkqle https://t.co/wENdbeO4yu
@rachchism
10 Feb 2025
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
We don’t just report vulns—we help our customers stay ahead. Our researchers exploited #SonicWall CVE-2024-53704, critical auth bypass that allows remote, unauthenticated session hijacking. Full details: https://t.co/Ygaox1kGkv https://t.co/3LCFizkex2
@bishopfox
10 Feb 2025
190 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
SonicOS の深刻な認証バイパスの脆弱性 CVE-2024-53704 が FIX:PoC もリリース https://t.co/O6iYsPDbH5 SonicWall SSLVPN で用いられる SonicOS の脆弱性 CVE-2024-53704 ですが、PoC が公開されました。この脆弱性の公表時点では悪用の形跡はないとのことですが、ご利用のチームは、十分に… https://t.co/Ad6tZsMPr4
@iototsecnews
10 Feb 2025
125 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A critical flaw in #SonicWall CVE-2024-53704 allows remote VPN session hijacking. If you're using SonicOS versions 7.1.x, 7.1.2-7019, or 8.0.0-8035, take action—over 5,000 devices are still vulnerable! Safeguard yourself: https://t.co/PgAE6X0a9w #cybersecurity #VPN #SonicWall
@behkfox
2 Feb 2025
60 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall CVE-2024-53704: Authentication Bypass anche con MFA attiva! - https://t.co/PqqNfawoEh
@Cysafenews
31 Jan 2025
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Hey, quick question anyone here using SonicWall firewalls? Apparently, there’s a huge security flaw (CVE-2024-53704) that lets hackers take over VPN sessions. Patching is a must, or just disable SSL VPN if you can’t. Details go public Feb 10. Thoughts?
@BrookyCyberAU
31 Jan 2025
180 Impressions
1 Retweet
2 Likes
0 Bookmarks
1 Reply
0 Quotes
Hey, quick question anyone here using SonicWall firewalls? Apparently, there’s a huge security flaw (CVE-2024-53704) that lets hackers take over VPN sessions. Patching is a must, or just disable SSL VPN if you can’t. Details go public Feb 10. Thoughts?
@BrookyCyberAU
31 Jan 2025
174 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Hey, quick question anyone here using SonicWall firewalls? Apparently, there’s a huge security flaw (CVE-2024-53704) that lets hackers take over VPN sessions. Patching is a must, or just disable SSL VPN if you can’t. Details go public Feb 10. Thoughts?
@BrookyCyberAU
31 Jan 2025
74 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall Firewalls at Risk! 🚨 Hackers can break into thousands of SonicWall firewalls due to a serious flaw (CVE-2024-53704). If you use one, update NOW or disable SSL VPN! 🛑 Fix it: ✅ Update SonicOS (7.1.3-7015+ or 8.0.0-8037+) ✅ Disable SSL VPN if you can’t patch
@BrookyCyberAU
31 Jan 2025
100 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Major vulnerability alert: SonicWall disclosed CVE-2024-53704, allowing attackers to hijack SSLVPN sessions on Gen7 Firewalls. Critical risk for network security. 🔒 #SonicWall #SSLVPN #USA link: https://t.co/7dBarNFXls https://t.co/HAKfGDExzW
@TweetThreatNews
28 Jan 2025
89 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
The Rapid7 ETR team just published an analysis of CVE-2024-53704, a SonicWall VPN authentication bypass that was announced earlier this month. Check it out! https://t.co/ZLB7SnyX39
@the_emmons
28 Jan 2025
10279 Impressions
22 Retweets
63 Likes
17 Bookmarks
2 Replies
2 Quotes
#注意喚起 5,000 台以上の SonicWall ファイアウォールが依然として攻撃に対して脆弱 (CVE-2024-53704) 5,000+ SonicWall firewalls still open to attack (CVE-2024-53704) #HelpNetSecurity (Jan 27) https://t.co/hDprWFvnim
@foxbook
27 Jan 2025
83 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
5,000+ #SonicWall #firewalls still open to attack (#CVE-2024-53704) https://t.co/nBwDkBVdf3
@ScyScan
27 Jan 2025
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall CVE-2024-53704: SSL VPN Session Hijacking https://t.co/eidfMtfIds
@Dinosn
22 Jan 2025
2759 Impressions
13 Retweets
36 Likes
8 Bookmarks
0 Replies
0 Quotes
به تازگی برای محصولات SSH management و VPN مربوط به SonicWall آسیب پذیری با کد شناسایی CVE-2024-53704 منتشر شده است. فایروال های SonicWall نسخه 6.5.4.15-117n و قدیمی تر دارای این آسیب پذیری می باشند. https://t.co/Poz3aKY03t https://t.co/ASQSreK18Q
@AmirHossein_sec
12 Jan 2025
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-53704 impacts SonicWall #CVE-2024-53704 #SonicWall https://t.co/JIKpnqT0oD
@pravin_karthik
11 Jan 2025
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Threat Alert: SonicWall tells admins to patch worrying SSLVPN flaw immediately CVE-2024-53704 CVE-2024-40762 CVE-2024-53705 Severity: 🔴 High Maturity: 🧨 Trending Learn more: https://t.co/BE7rIxijE6 #CyberSecurity #ThreatIntel #InfoSec
@fletch_ai
10 Jan 2025
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall SSLVPN認証メカニズムにおける不適切な認証により、リモート攻撃者が認証を回避可能 CVE-2024-53704 CVSS 8.2 など、修正済みバージョンがリリースされました。 影響範囲:SonicWallのGen6およびGen7ファイアウォール製品、クラウドプラットフォーム(AWSおよびAzureエディション) https://t.co/6yCbUuaI1j
@t_nihonmatsu
10 Jan 2025
274 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall SSLVPN認証メカニズムにおける不適切な認証により、リモート攻撃者が認証を回避可能 CVE-2024-53704 CVSS 8.2 など 影響範囲:SonicWallのGen6およびGen7ファイアウォール製品、クラウドプラットフォーム(AWSおよびAzureエディション) 最新のバージョンにアップデートして下さい。 https://t.co/QytCcSCVH9
@t_nihonmatsu
10 Jan 2025
62 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Heads up, cybersecurity folks! SonicWall's SSL VPN bug (CVE-2024-53704) is a high-severity vulnerability. Patch your devices now & limit access to stay safe! #CyberSecurity #PatchNow More info: https://t.co/4qGDEhQ0DZ
@ThreatVector24
9 Jan 2025
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Warning: 4 High vulnerabilities in several SonicWall firewall products, #CVE-2024-53704 being the highest with CVSS:8.2. These could lead to authentication bypass, remote code execution and unauthorized connection! #Patch #Patch #Patch https://t.co/bQmckqgzfC
@CCBalert
9 Jan 2025
104 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
CVE-2024-53704,CVE-2024-40762,CVE-2024-53705,CVE-2024-53706 alert 🚨 SonicWall improper authentication vulnerability in the SSLVPN The vulnerability is actively exploited in the wild and has been integrated into Patrowl. Our customers assets are protected. 🦉 #CyberSec #SonicWall
@Patrowl_io
9 Jan 2025
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "065DD610-7821-4A0E-9CC8-1255F1729126",
"versionEndIncluding": "7.1.1-7058",
"versionStartIncluding": "7.1.1-7040"
},
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:7.1.2-7019:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0131B5D1-47FF-4A35-8983-7C08E021F7A4"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "8D8B0C7A-FD65-47CA-A625-150A90EFA7A1"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A69E000B-5806-46FD-A233-4E2CC9DD38D2"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "8DF4A322-7CC7-4AB9-B10E-FFF34DF2182D"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4C15FED5-C48C-47CF-9645-0563D77883C1"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A884B1BB-F201-4C77-9F6E-B8A884DCD4C2"
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "7C3BA5A3-1160-4793-A8D6-40B9D264BCC4"
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "6739DEA3-06FF-4FEB-9931-0DB27F63B70E"
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "0250EDF9-0AEF-4711-8EF6-D447CF48BCAF"
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "7D6CF3CF-256C-4C04-8BDF-B16398CD0459"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsv_270:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "F2ABC8D8-2943-4073-9568-E87961A18998"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsv_470:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9F57D527-AA3F-45E9-9BCE-6F76691066B5"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsv_870:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "F5ECCCF0-A5D8-42A8-8EC1-D12B49B1124A"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:8.0.0-8035:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "495254B3-5733-467E-AAA0-A9D385328C8E"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:tz80:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "129CC10F-E822-4BF7-9EB5-0D702020CB0C"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]