Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-7477


A vulnerability in SonicWall SonicOS and SonicOSv TLS CBC Cipher allow remote attackers to obtain sensitive plaintext data when CBC cipher suites are enabled. This vulnerability affected SonicOS Gen 5 version 5.9.1.10 and earlier, Gen 6 version 6.2.7.3, 6.5.1.3, 6.5.2.2, 6.5.3.1, 6.2.7.8, 6.4.0.0, 6.5.1.8, 6.0.5.3-86o and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V).


Published

2019-04-02T18:30:25.257

Last Modified

2024-11-21T04:48:15.470

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-327
  • Type: Primary
    CWE-327

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System sonicwall sonicos ≤ 5.9.1.10 Yes
Operating System sonicwall sonicos 6.0.5.3-86o Yes
Operating System sonicwall sonicos 6.2.7.3 Yes
Operating System sonicwall sonicos 6.2.7.8 Yes
Operating System sonicwall sonicos 6.4.0.0 Yes
Operating System sonicwall sonicos 6.5.1.3 Yes
Operating System sonicwall sonicos 6.5.1.8 Yes
Operating System sonicwall sonicos 6.5.2.2 Yes
Operating System sonicwall sonicos 6.5.3.1 Yes
Operating System sonicwall sonicosv 6.5.0.2-8v_rc363 Yes
Operating System sonicwall sonicosv 6.5.0.2.8v_rc366 Yes
Operating System sonicwall sonicosv 6.5.0.2.8v_rc367 Yes
Operating System sonicwall sonicosv 6.5.0.2.8v_rc368 Yes

References