CVE-2020-5141 vulnerability in SonicWall Products
Published on October 12, 2020
A vulnerability in SonicOS allows a remote unauthenticated attacker to brute force Virtual Assist ticket ID in the firewall SSLVPN service. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0.
Weakness Type
What is an Insufficient anti-automation Vulnerability?
The software does not properly limit the number or frequency of interactions that it has with an actor, such as the number of incoming requests. This can allow the actor to perform actions more frequently than expected. The actor could be a human or an automated process such as a virus or bot. This could be used to cause a denial of service, compromise program logic (such as limiting humans to a single vote), or other consequences. For example, an authentication routine might not limit the number of times an attacker can guess a password. Or, a web site might conduct a poll but only expect humans to vote a maximum of once a day.
CVE-2020-5141 has been classified to as an Insufficient anti-automation vulnerability or weakness.
Products Associated with CVE-2020-5141
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2020-5141 are published in these products:
Affected Versions
SonicWall SonicOS:- Version SonicOS 6.5.4.7-79n and earlier is affected.
- Version SonicOS 5.9.1.7-2n and earlier is affected.
- Version SonicOS 5.9.1.13-5n and earlier is affected.
- Version SonicOS 6.5.1.11-4n and earlier is affected.
- Version SonicOS 6.0.5.3-93o and earlier is affected.
- Version SonicOSv 6.5.4.4-44v-21-794 and earlier is affected.
- Version SonicOS 7.0.0.0-1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.