{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-5970","assignerOrgId":"44b2ff79-1416-4492-88bb-ed0da00c7315","state":"PUBLISHED","assignerShortName":"sonicwall","dateReserved":"2023-11-06T17:14:04.677Z","datePublished":"2023-12-05T20:20:01.534Z","dateUpdated":"2024-08-02T08:14:25.142Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","platforms":["SMA 200","SMA 210","SMA 400","SMA 410","SMA 500v"],"product":"SMA100","vendor":"SonicWall","versions":[{"status":"affected","version":"10.2.1.9-57sv and earlier versions"}]}],"datePublic":"2023-12-05T17:10:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Improper authentication in the SMA100 SSL-VPN virtual office portal allows a remote authenticated attacker to create an identical external domain user using accent characters, resulting in an MFA bypass."}],"value":"Improper authentication in the SMA100 SSL-VPN virtual office portal allows a remote authenticated attacker to create an identical external domain user using accent characters, resulting in an MFA bypass."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-287","description":"CWE-287 Improper Authentication","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"44b2ff79-1416-4492-88bb-ed0da00c7315","shortName":"sonicwall","dateUpdated":"2023-12-05T20:20:01.534Z"},"references":[{"tags":["vendor-advisory"],"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0018"}],"source":{"advisory":"SNWLID-2023-0018","discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:14:25.142Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0018"}]}]}}