First published: Wed Sep 30 2020(Updated: )
SonicWall SSL-VPN products and SonicWall firewall SSL-VPN feature misconfiguration leads to possible DNS flaw known as domain name collision vulnerability. When the users publicly display their organization’s internal domain names in the SSL-VPN authentication page, an attacker with knowledge of internal domain names can potentially take advantage of this vulnerability.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sonicwall Sma100 Firmware | =10.2.0.2-20sv | |
Sonicwall Sma100 Firmware | =12.4.0-2223 | |
SonicWall SMA100 | ||
SonicWall SonicOS | =6.5.4.6-79n |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5132 refers to a vulnerability in SonicWall SSL-VPN products and SonicWall firewall SSL-VPN feature known as domain name collision vulnerability.
CVE-2020-5132 has a severity rating of 5.3, which is considered medium.
Sonicwall Sma100 Firmware versions 10.2.0.2-20sv and 12.4.0-2223, as well as SonicWall SonicOS version 6.5.4.6-79n, are affected by CVE-2020-5132.
CVE-2020-5132 allows an attacker with knowledge of internal domain names displayed in the SSL-VPN authentication page to exploit a DNS flaw.
No, SonicWall SMA100 is not affected by CVE-2020-5132.