CVE-2020-5138 vulnerability in SonicWall Products
Published on October 12, 2020
A Heap Overflow vulnerability in the SonicOS allows a remote unauthenticated attacker to cause Denial of Service (DoS) on the firewall SSLVPN service and leads to SonicOS crash. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0.
Weakness Type
Heap-based Buffer Overflow
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Products Associated with CVE-2020-5138
stack.watch emails you whenever new vulnerabilities are published in SonicWall Sonicos or SonicWall Sonicosv. Just hit a watch button to start following.
Affected Versions
SonicWall SonicOS:- Version SonicOS 6.5.4.7-79n and earlier is affected.
- Version SonicOS 5.9.1.7-2n and earlier is affected.
- Version SonicOS 5.9.1.13-5n and earlier is affected.
- Version SonicOS 6.5.1.11-4n and earlier is affected.
- Version SonicOS 6.0.5.3-93o and earlier is affected.
- Version SonicOSv 6.5.4.4-44v-21-794 and earlier is affected.
- Version SonicOS 7.0.0.0-1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.