CVE-2020-5139 vulnerability in SonicWall Products
Published on October 12, 2020
A vulnerability in SonicOS SSLVPN service allows a remote unauthenticated attacker to cause Denial of Service (DoS) due to the release of Invalid pointer and leads to a firewall crash. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0.
Weakness Type
Release of Invalid Pointer or Reference
The application attempts to return a memory resource to the system, but calls the wrong release function or calls the appropriate release function incorrectly.
Products Associated with CVE-2020-5139
stack.watch emails you whenever new vulnerabilities are published in SonicWall Sonicos or SonicWall Sonicosv. Just hit a watch button to start following.
Affected Versions
SonicWall SonicOS:- Version SonicOS 6.5.4.7-79n and earlier is affected.
- Version SonicOS 5.9.1.7-2n and earlier is affected.
- Version SonicOS 5.9.1.13-5n and earlier is affected.
- Version SonicOS 6.5.1.11-4n and earlier is affected.
- Version SonicOS 6.0.5.3-93o and earlier is affected.
- Version SonicOSv 6.5.4.4-44v-21-794 and earlier is affected.
- Version SonicOS 7.0.0.0-1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.