A vulnerability in SonicWall SonicOS and SonicOSv, allow authenticated read-only admin to leave the firewall in an unstable state by downloading certificate with specific extension. This vulnerability affected SonicOS Gen 5 version 5.9.1.10 and earlier, Gen 6 version 6.2.7.3, 6.5.1.3, 6.5.2.2, 6.5.3.1, 6.2.7.8, 6.4.0.0, 6.5.1.8, 6.0.5.3-86o and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V).
2019-04-02T18:30:25.147
2024-11-21T04:48:15.067
Modified
CVSSv3.1: 6.5 (MEDIUM)
AV:N/AC:L/Au:S/C:N/I:N/A:P
8.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | sonicwall | sonicos | ≤ 5.9.1.10 | Yes |
Operating System | sonicwall | sonicos | 6.0.5.3-86o | Yes |
Operating System | sonicwall | sonicos | 6.2.7.3 | Yes |
Operating System | sonicwall | sonicos | 6.2.7.8 | Yes |
Operating System | sonicwall | sonicos | 6.4.0.0 | Yes |
Operating System | sonicwall | sonicos | 6.5.1.3 | Yes |
Operating System | sonicwall | sonicos | 6.5.1.8 | Yes |
Operating System | sonicwall | sonicos | 6.5.2.2 | Yes |
Operating System | sonicwall | sonicos | 6.5.3.1 | Yes |
Operating System | sonicwall | sonicosv | 6.5.0.2-8v_rc363 | Yes |
Operating System | sonicwall | sonicosv | 6.5.0.2.8v_rc366 | Yes |
Operating System | sonicwall | sonicosv | 6.5.0.2.8v_rc367 | Yes |
Operating System | sonicwall | sonicosv | 6.5.0.2.8v_rc368 | Yes |