sonicwall sonicos CVE-2020-5141 vulnerability in SonicWall Products
Published on October 12, 2020

A vulnerability in SonicOS allows a remote unauthenticated attacker to brute force Virtual Assist ticket ID in the firewall SSLVPN service. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0.

NVD

Weakness Type

What is an Insufficient anti-automation Vulnerability?

The software does not properly limit the number or frequency of interactions that it has with an actor, such as the number of incoming requests. This can allow the actor to perform actions more frequently than expected. The actor could be a human or an automated process such as a virus or bot. This could be used to cause a denial of service, compromise program logic (such as limiting humans to a single vote), or other consequences. For example, an authentication routine might not limit the number of times an attacker can guess a password. Or, a web site might conduct a poll but only expect humans to vote a maximum of once a day.

CVE-2020-5141 has been classified to as an Insufficient anti-automation vulnerability or weakness.


Products Associated with CVE-2020-5141

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2020-5141 are published in these products:

 
 

Affected Versions

SonicWall SonicOS:

Exploit Probability

EPSS
0.46%
Percentile
63.60%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.