First published: Tue Feb 11 2020(Updated: )
An Authentication Bypass Vulnerability exists in DELL SonicWALL Analyzer 7.0, Global Management System (GMS) 4.1, 5.0, 5.1, 6.0, and 7.0; Universal Management Appliance (UMA) 5.1, 6.0, and 7.0 and ViewPoint 4.1, 5.0, 5.1, and 6.0 via the skipSessionCheck parameter to the UMA interface (/appliance/), which could let a remote malicious user obtain access to the root account.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWALL Analyzer | =7.0 | |
SonicWALL Global Management System | =4.1 | |
SonicWALL Global Management System | =5.0 | |
SonicWALL Global Management System | =5.1 | |
SonicWALL Global Management System | =6.0 | |
SonicWALL Global Management System | =7.0 | |
Sonicwall Universal Management Appliance | =5.1 | |
Sonicwall Universal Management Appliance | =6.0 | |
Sonicwall Universal Management Appliance | =7.0 | |
Sonicwall Viewpoint | =4.1 | |
Sonicwall Viewpoint | =5.0 | |
Sonicwall Viewpoint | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1359 is an Authentication Bypass Vulnerability that exists in DELL SonicWALL Analyzer 7.0, Global Management System (GMS) 4.1, 5.0, 5.1, 6.0, and 7.0; Universal Management Appliance (UMA) 5.1, 6.0, and 7.0 and ViewPoint 4.1, 5.0, 5.1, and 6.0.
The severity of CVE-2013-1359 is critical with a CVSS score of 9.8.
The vulnerability allows an attacker to bypass authentication by using the skipSessionCheck parameter to the UMA interface.
The affected software versions include DELL SonicWALL Analyzer 7.0, Global Management System (GMS) 4.1, 5.0, 5.1, 6.0, and 7.0; Universal Management Appliance (UMA) 5.1, 6.0, and 7.0; and ViewPoint 4.1, 5.0, 5.1, and 6.0.
Yes, there are known exploits for CVE-2013-1359. You can find more information about them on the following websites: http://www.exploit-db.com/exploits/24204, http://www.exploit-db.com/exploits/24322, and http://www.securityfocus.com/bid/57445.