Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-7475


A vulnerability in SonicWall SonicOS and SonicOSv with management enabled system on specific configuration allow unprivileged user to access advanced routing services. This vulnerability affected SonicOS Gen 5 version 5.9.1.10 and earlier, Gen 6 version 6.2.7.3, 6.5.1.3, 6.5.2.2, 6.5.3.1, 6.2.7.8, 6.4.0.0, 6.5.1.8, 6.0.5.3-86o and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V).


Published

2019-04-02T18:30:25.207

Last Modified

2024-11-21T04:48:15.200

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Secondary
    CWE-284
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System sonicwall sonicos ≤ 5.9.1.10 Yes
Operating System sonicwall sonicos 6.0.5.3-86o Yes
Operating System sonicwall sonicos 6.2.7.3 Yes
Operating System sonicwall sonicos 6.2.7.8 Yes
Operating System sonicwall sonicos 6.4.0.0 Yes
Operating System sonicwall sonicos 6.5.1.3 Yes
Operating System sonicwall sonicos 6.5.1.8 Yes
Operating System sonicwall sonicos 6.5.2.2 Yes
Operating System sonicwall sonicos 6.5.3.1 Yes
Operating System sonicwall sonicosv 6.5.0.2-8v_rc363 Yes
Operating System sonicwall sonicosv 6.5.0.2.8v_rc366 Yes
Operating System sonicwall sonicosv 6.5.0.2.8v_rc367 Yes
Operating System sonicwall sonicosv 6.5.0.2.8v_rc368 Yes

References