First published: Fri Mar 05 2021(Updated: )
SonicWall SSO-agent default configuration uses NetAPI to probe the associated IP's in the network, this client probing method allows a potential attacker to capture the password hash of the privileged user and potentially forces the SSO Agent to authenticate allowing an attacker to bypass firewall access controls.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall Directory Services Connector | <4.1.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5148 is a vulnerability in SonicWall SSO-agent that allows an attacker to capture the password hash of a privileged user and bypass firewall authentication.
CVE-2020-5148 works by exploiting the default configuration of SonicWall SSO-agent, which uses NetAPI to probe associated IP addresses in the network, allowing an attacker to capture password hashes and potentially bypass firewall authentication.
CVE-2020-5148 has a severity rating of 8.2, which is considered high.
SonicWall Directory Services Connector version up to and excluding 4.1.19 is affected by CVE-2020-5148.
To protect against CVE-2020-5148, it is recommended to update SonicWall Directory Services Connector to a version that includes the necessary security patches.