CVE-2023-6340

CVSS 3.1 Score 5.5 of 10 (medium)

Details

Published Jan 18, 2024
Updated: Jan 29, 2024
CWE ID 787
CWE ID 121

Summary

CVE-2023-6340, also known as SonicWall Capture Client version 3.7.10 and NetExtender client version 10.2.337 and earlier, has a vulnerability in the sfpmonitor.sys driver that can be exploited to cause a Denial-of-Service (DoS) through Stack-based Buffer Overflow. This vulnerability affects various products, including g2HKK1, mpPu51, ezGbu2, ezGbu3, ezGbu0, ezGbu1, ezGbuy, ezGbuz, t0QpIY, enbPn5, j7Q-Y4, and enbPn4. The risk score for this vulnerability is 25 out of 100. The impact score is 3.6 out of 10, indicating a medium severity level with high availability impact. The base score is 5.5 out of 10. To remediate this vulnerability, it is recommended to update the affected products to newer versions or apply patches provided by SonicWall promptly.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-6340 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions