6.5

CVE-2019-7474

A vulnerability in SonicWall SonicOS and SonicOSv, allow authenticated read-only admin to leave the firewall in an unstable state by downloading certificate with specific extension. This vulnerability affected SonicOS Gen 5 version 5.9.1.10 and earlier, Gen 6 version 6.2.7.3, 6.5.1.3, 6.5.2.2, 6.5.3.1, 6.2.7.8, 6.4.0.0, 6.5.1.8, 6.0.5.3-86o and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V).

Data is provided by the National Vulnerability Database (NVD)
SonicwallSonicos Version <= 5.9.1.10
SonicwallSonicos Version6.0.5.3-86o
SonicwallSonicos Version6.2.7.3
SonicwallSonicos Version6.2.7.8
SonicwallSonicos Version6.4.0.0
SonicwallSonicos Version6.5.1.3
SonicwallSonicos Version6.5.1.8
SonicwallSonicos Version6.5.2.2
SonicwallSonicos Version6.5.3.1
SonicwallSonicosv Version6.5.0.2-8v_rc363 SwPlatformvmware
SonicwallSonicosv Version6.5.0.2.8v_rc366 SwPlatformhyper_v
SonicwallSonicosv Version6.5.0.2.8v_rc367 SwPlatformazure
SonicwallSonicosv Version6.5.0.2.8v_rc368 SwPlatformaws
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.22% 0.448
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 4 8 2.9
AV:N/AC:L/Au:S/C:N/I:N/A:P
CWE-248 Uncaught Exception

An exception is thrown from a function, but it is not caught.

CWE-755 Improper Handling of Exceptional Conditions

The product does not handle or incorrectly handles an exceptional condition.