CVE-2019-7479
HIGH WAF: Low
CVSS 7.2
Published: 2019-12-31
CWE-269
A vulnerability in SonicOS allow authenticated read-only admin can elevate permissions to configuration mode. This vulnerability affected SonicOS Gen 5 version 5.9.1.12-4o and earlier, Gen 6 version 6.2.7.4-32n, 6.5.1.4-4n, 6.5.2.3-4n, 6.5.3.3-3n, 6.2.7.10-3n, 6.4.1.0-3n, 6.5.3.3-3n, 6.5.1.9-4n and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V).
WAF Coverage Analysis
Improper Privilege Management
Low WAF Coverage
OWASP: A01:2021 Broken Access Control
Affected Software
| Vendor | Product | Version |
|---|---|---|
| sonicwall | sonicos | up to 5.9.1.12-4o |
| sonicwall | sonicos | 6.2.7.4-32n |
| sonicwall | sonicos | 6.2.7.10-3n |
| sonicwall | sonicos | 6.4.1.0-3n |
| sonicwall | sonicos | 6.5.1.4-4n |
| sonicwall | sonicos | 6.5.1.9-4n |
| sonicwall | sonicos | 6.5.2.3-4n |
| sonicwall | sonicos | 6.5.3.3-3n |
| sonicwall | sonicosv | 6.5.0.2.8v |
| sonicwall | sonicosv | 6.5.0.2.8v |
References
- psirt.global.sonicwall.com (Vendor Advisory)