CVE Vulnerabilities

CVE-2020-5141

Improper Restriction of Excessive Authentication Attempts

Published: Oct 12, 2020 | Modified: Oct 23, 2020
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS 2.x
6.4 MEDIUM
AV:N/AC:L/Au:N/C:P/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu

A vulnerability in SonicOS allows a remote unauthenticated attacker to brute force Virtual Assist ticket ID in the firewall SSLVPN service. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0.

Weakness

The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks.

Affected Software

Name Vendor Start Version End Version
Sonicos Sonicwall * 5.9.1.13 (including)
Sonicos Sonicwall 6.0.0.0 (including) 6.0.5.3 (including)
Sonicos Sonicwall 6.5.0.0 (including) 6.5.1.11 (including)
Sonicos Sonicwall 6.5.4.0 (including) 6.5.4.7 (including)
Sonicos Sonicwall 7.0.0.0 (including) 7.0.0.0 (including)
Sonicosv Sonicwall * 6.5.4.4 (including)

Potential Mitigations

  • Common protection mechanisms include:

  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.

  • Consider using libraries with authentication capabilities such as OpenSSL or the ESAPI Authenticator. [REF-45]

References