Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-7474


A vulnerability in SonicWall SonicOS and SonicOSv, allow authenticated read-only admin to leave the firewall in an unstable state by downloading certificate with specific extension. This vulnerability affected SonicOS Gen 5 version 5.9.1.10 and earlier, Gen 6 version 6.2.7.3, 6.5.1.3, 6.5.2.2, 6.5.3.1, 6.2.7.8, 6.4.0.0, 6.5.1.8, 6.0.5.3-86o and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V).


Published

2019-04-02T18:30:25.147

Last Modified

2024-11-21T04:48:15.067

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.5 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

8.0

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-248
  • Type: Primary
    CWE-755

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System sonicwall sonicos ≤ 5.9.1.10 Yes
Operating System sonicwall sonicos 6.0.5.3-86o Yes
Operating System sonicwall sonicos 6.2.7.3 Yes
Operating System sonicwall sonicos 6.2.7.8 Yes
Operating System sonicwall sonicos 6.4.0.0 Yes
Operating System sonicwall sonicos 6.5.1.3 Yes
Operating System sonicwall sonicos 6.5.1.8 Yes
Operating System sonicwall sonicos 6.5.2.2 Yes
Operating System sonicwall sonicos 6.5.3.1 Yes
Operating System sonicwall sonicosv 6.5.0.2-8v_rc363 Yes
Operating System sonicwall sonicosv 6.5.0.2.8v_rc366 Yes
Operating System sonicwall sonicosv 6.5.0.2.8v_rc367 Yes
Operating System sonicwall sonicosv 6.5.0.2.8v_rc368 Yes

References