Domain Name Collision Vulnerability in SonicWall SSL-VPN Products
CVE-2020-5132

5.3MEDIUM

Key Information:

Vendor
Sonicwall
Vendor
CVE Published:
30 September 2020

Summary

The misconfiguration of SonicWall SSL-VPN products and the associated firewall SSL-VPN feature allows for a domain name collision vulnerability. Organizations that display their internal domain names on public SSL-VPN authentication pages increase their exposure to risks. An attacker aware of these internal domain names could exploit them, leading to potential unauthorized access or information disclosure. It is essential for users of SonicWall products to implement strict access controls and minimize the visibility of internal domain names to mitigate this risk.

Affected Version(s)

SMA100 SMA100 10.2.0.2-20sv

SMA1000 SMA1000 12.4.0-2223

SonicOS SonicOS 6.5.4.6-79n

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.