CVE-2020-5139Release of Invalid Pointer or Reference in Sonicos

Severity
7.5HIGHNVD
EPSS
0.5%
top 33.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 12
Latest updateMay 24

Description

A vulnerability in SonicOS SSLVPN service allows a remote unauthenticated attacker to cause Denial of Service (DoS) due to the release of Invalid pointer and leads to a firewall crash. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDsonicwall/sonicosv6.5.4.4
NVDsonicwall/sonicos6.0.0.06.0.5.3+4
CVEListV5sonicwall/sonicos7 versions+6

🔴Vulnerability Details

2
GHSA
GHSA-g2f3-3734-6q3w: A vulnerability in SonicOS SSLVPN service allows a remote unauthenticated attacker to cause Denial of Service (DoS) due to the release of Invalid poin2022-05-24
CVEList
CVE-2020-5139: A vulnerability in SonicOS SSLVPN service allows a remote unauthenticated attacker to cause Denial of Service (DoS) due to the release of Invalid poin2020-10-12
CVE-2020-5139 — Release of Invalid Pointer or Reference | cvebase