Discover the impact of CVE-2019-7474, a vulnerability in SonicWall SonicOS and SonicOSv allowing authenticated read-only admins to destabilize firewalls. Learn about affected versions and mitigation steps.
A vulnerability has been discovered in the SonicWall SonicOS and SonicOSv which allows authenticated read-only administrators to cause the firewall to become unstable by downloading a certificate with a specific extension. This vulnerability affects various versions of SonicOS Gen 5 (5.9.1.10 and earlier) and Gen 6 (6.2.7.3, 6.5.1.3, 6.5.2.2, 6.5.3.1, 6.2.7.8, 6.4.0.0, 6.5.1.8, 6.0.5.3-86o) as well as SonicOSv versions 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), 6.5.0.2.8v_RC368 (AWS), and 6.5.0.2.8v_RC366 (HYPER_V).
Understanding CVE-2019-7474
This section provides insights into the nature and impact of the CVE-2019-7474 vulnerability.
What is CVE-2019-7474?
CVE-2019-7474 is a vulnerability in SonicWall SonicOS and SonicOSv that allows authenticated read-only administrators to destabilize the firewall by downloading a certificate with a specific extension.
The Impact of CVE-2019-7474
The vulnerability can lead to the firewall becoming unstable, potentially impacting the security and functionality of the affected systems.
Technical Details of CVE-2019-7474
Explore the technical aspects of the CVE-2019-7474 vulnerability.
Vulnerability Description
The vulnerability in SonicWall SonicOS and SonicOSv enables authenticated read-only administrators to disrupt the firewall's stability through the download of a certificate with a specific extension.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability is exploited by authenticated read-only administrators downloading a certificate with a specific extension, triggering instability in the firewall.
Mitigation and Prevention
Learn how to mitigate and prevent the CVE-2019-7474 vulnerability.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates