CVE-2019-7474 vulnerability in SonicWall Products
Published on April 2, 2019
A vulnerability in SonicWall SonicOS and SonicOSv, allow authenticated read-only admin to leave the firewall in an unstable state by downloading certificate with specific extension. This vulnerability affected SonicOS Gen 5 version 5.9.1.10 and earlier, Gen 6 version 6.2.7.3, 6.5.1.3, 6.5.2.2, 6.5.3.1, 6.2.7.8, 6.4.0.0, 6.5.1.8, 6.0.5.3-86o and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V).
Weakness Type
Uncaught Exception
An exception is thrown from a function, but it is not caught. When an exception is not caught, it may cause the program to crash or expose sensitive information.
Products Associated with CVE-2019-7474
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2019-7474 are published in these products:
Affected Versions
SonicWall SonicOS:- Version 5.9.1.10 and earlier is affected.
- Version 6.2.7.3 is affected.
- Version 6.5.1.3 is affected.
- Version 6.5.2.2 is affected.
- Version 6.5.3.1 is affected.
- Version 6.2.7.8 is affected.
- Version 6.4.0.0 is affected.
- Version 6.5.1.8 is affected.
- Version 6.0.5.3-86o is affected.
- Version 6.5.0.2-8v_RC363 (VMWARE) is affected.
- Version 6.5.0.2.8v_RC367 (AZURE) is affected.
- Version 6.5.0.2.8v_RC368 (AWS) is affected.
- Version 6.5.0.2.8v_RC366 (HYPER_V) is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.