![]() ![]() SonicWall strongly advises organizations using the affected SonicWall firewalls listed above to follow the guidance provided. No PoC reports have been published and malicious exploitation of this vulnerability has not been reported to SonicWall. The vendor is not aware of any active exploitation of the vulnerability. The SonicWall Gen6 and Gen 6.5 firewalls are probably not affected by this vulnerability. ![]() The above vulnerability only affects the web management interface, the SonicOS SSLVPN interface is not affected. The following products are affected by the stack-based buffer overflow vulnerability, which can allow a remote attacker to launch a Denial of Service (DoS) attack without authentication and can crash an affected firewall. Blog reader Adrian alerted me to Mastodon about this vulnerability, which was rated with a CVSS of 7.5 (High) (thanks for that). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |