sonicwall netextender CVE-2020-5147 is a vulnerability in SonicWall Netextender
Published on January 9, 2021

SonicWall NetExtender Windows client vulnerable to unquoted service path vulnerability, this allows a local attacker to gain elevated privileges in the host operating system. This vulnerability impact SonicWall NetExtender Windows client version 10.2.300 and earlier.

NVD

Weakness Type

Unquoted Search Path or Element

The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path. If a malicious individual has access to the file system, it is possible to elevate privileges by inserting such a file as "C:\Program.exe" to be run by a privileged program making use of WinExec.


Products Associated with CVE-2020-5147

Want to know whenever a new CVE is published for SonicWall Netextender? stack.watch will email you.

 

Affected Versions

SonicWall NetExtender Version 10.2.300 and earlier is affected by CVE-2020-5147

Exploit Probability

EPSS
0.09%
Percentile
26.28%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.