Vulnerability Description
SonicWall SSO-agent default configuration uses NetAPI to probe the associated IP's in the network, this client probing method allows a potential attacker to capture the password hash of the privileged user and potentially forces the SSO Agent to authenticate allowing an attacker to bypass firewall access controls.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sonicwall | Directory Services Connector | < 4.1.19 |
Related Weaknesses (CWE)
References
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0003Vendor Advisory
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0003Vendor Advisory
FAQ
What is CVE-2020-5148?
CVE-2020-5148 is a vulnerability with a CVSS score of 8.2 (HIGH). SonicWall SSO-agent default configuration uses NetAPI to probe the associated IP's in the network, this client probing method allows a potential attacker to capture the password hash of the privileged...
How severe is CVE-2020-5148?
CVE-2020-5148 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-5148?
Check the references section above for vendor advisories and patch information. Affected products include: Sonicwall Directory Services Connector.