Domain Name Collision Vulnerability in SonicWall SSL-VPN Products
CVE-2020-5132
5.3MEDIUM
Summary
The misconfiguration of SonicWall SSL-VPN products and the associated firewall SSL-VPN feature allows for a domain name collision vulnerability. Organizations that display their internal domain names on public SSL-VPN authentication pages increase their exposure to risks. An attacker aware of these internal domain names could exploit them, leading to potential unauthorized access or information disclosure. It is essential for users of SonicWall products to implement strict access controls and minimize the visibility of internal domain names to mitigate this risk.
Affected Version(s)
SMA100 SMA100 10.2.0.2-20sv
SMA1000 SMA1000 12.4.0-2223
SonicOS SonicOS 6.5.4.6-79n
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved