CVE-2019-7479
31.12.2019, 02:15
A vulnerability in SonicOS allow authenticated read-only admin can elevate permissions to configuration mode. This vulnerability affected SonicOS Gen 5 version 5.9.1.12-4o and earlier, Gen 6 version 6.2.7.4-32n, 6.5.1.4-4n, 6.5.2.3-4n, 6.5.3.3-3n, 6.2.7.10-3n, 6.4.1.0-3n, 6.5.3.3-3n, 6.5.1.9-4n and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V).Enginsight
Vendor | Product | Version |
---|---|---|
sonicwall | sonicos | 𝑥 ≤ 5.9.1.12-4o |
sonicwall | sonicos | 6.2.7.4-32n |
sonicwall | sonicos | 6.2.7.10-3n |
sonicwall | sonicos | 6.4.1.0-3n |
sonicwall | sonicos | 6.5.1.4-4n |
sonicwall | sonicos | 6.5.1.9-4n |
sonicwall | sonicos | 6.5.2.3-4n |
sonicwall | sonicos | 6.5.3.3-3n |
sonicwall | sonicosv | 6.5.0.2.8v:v |
sonicwall | sonicosv | 6.5.0.2.8v:v |
sonicwall | sonicosv | 6.5.0.2.8v:v |
sonicwall | sonicosv | 6.5.0.2.8v:v |
sonicwall | sonicosv | 6.5.0.2.8v:v |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-285 - Improper AuthorizationThe software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
- CWE-269 - Improper Privilege ManagementThe software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.