A vulnerability in SonicWall SonicOS and SonicOSv TLS CBC Cipher allow remote attackers to obtain sensitive plaintext data when CBC cipher suites are enabled. This vulnerability affected SonicOS Gen 5 version 5.9.1.10 and earlier, Gen 6 version 6.2.7.3, 6.5.1.3, 6.5.2.2, 6.5.3.1, 6.2.7.8, 6.4.0.0, 6.5.1.8, 6.0.5.3-86o and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V).
Impacted versions: 6.5.0.2.8v_rc366, 6.5.0.2.8v_rc368, 6.5.0.2-8v_rc363, 6.5.0.2.8v_rc367
Base Score: 5.0, Severity: MEDIUM, ID: CVE-2019-7477, Last Modified: 2019-10-09T23:52:00Z
References
Vendor Advisory
|
A vulnerability in SonicWall SonicOS and SonicOSv with management enabled system on specific configuration allow unprivileged user to access advanced routing services. This vulnerability affected SonicOS Gen 5 version 5.9.1.10 and earlier, Gen 6 version 6.2.7.3, 6.5.1.3, 6.5.2.2, 6.5.3.1, 6.2.7.8, 6.4.0.0, 6.5.1.8, 6.0.5.3-86o and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V).
Impacted versions: 6.5.0.2-8v_rc363, 6.5.0.2.8v_rc368, 6.5.0.2.8v_rc366, 6.5.0.2.8v_rc367
Base Score: 7.5, Severity: HIGH, ID: CVE-2019-7475, Last Modified: 2019-10-09T23:52:00Z
References
Vendor Advisory
|
A vulnerability in SonicWall SonicOS and SonicOSv, allow authenticated read-only admin to leave the firewall in an unstable state by downloading certificate with specific extension. This vulnerability affected SonicOS Gen 5 version 5.9.1.10 and earlier, Gen 6 version 6.2.7.3, 6.5.1.3, 6.5.2.2, 6.5.3.1, 6.2.7.8, 6.4.0.0, 6.5.1.8, 6.0.5.3-86o and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V).
Impacted versions: 6.5.0.2.8v_rc368, 6.5.0.2.8v_rc367, 6.5.0.2-8v_rc363, 6.5.0.2.8v_rc366
Base Score: 4.0, Severity: MEDIUM, ID: CVE-2019-7474, Last Modified: 2019-10-09T23:52:00Z
References
Vendor Advisory
|