XenonStack Recommends

Security Intelligence

Microsoft CVE-2019-1405 and Sonic Wall CVE-2020-5135 Vulnerabilities

Parveen Bhandari | 12 August 2022

Subscription

XenonStack White Arrow

Thanks for submitting the form.

What is CVE-2020-5135?

SonicWall SonicOS Buffer Overflow Vulnerability

SonicWall NSAs are next-generation firewall appliances that include a sandbox, an intrusion prevention system, SSL/TLS decryption and inspection, network-based malware protection, and VPN functionality.

This vulnerability exists before authentication and within a component (SSLVPN) that is frequently accessible to the public Internet.

CVE-2020-5135 is a stack-based buffer overflow flaw in SonicWall's Network Security Appliance's VPN Portal. A remote, unauthenticated attacker might exploit the flaw by submitting a specially crafted HTTP request with a custom protocol handler to a vulnerable device. According to the flaw's investigation, an unbounded string copy was being utilized to copy data from an HTTP request header directly into a response buffer without a proper length check.

At the very least, effective exploitation would cause the exploited device's resources to be depleted, resulting in a denial of service issue. According to the researchers, they were able to divert execution flow through stack corruption, implying that RCE is certainly doable. Hundreds of thousands of devices may be affected.

According to SonicWall, the following versions provide a workaround for this problem:

  • SonicOS 6.5.1.12-1n
  • SonicOS 6.0.5.3-94o
  • SonicOS 6.5.4.7-83n
  • SonicOS 6.5.4.v-21s-987
  • Gen 7 7.0.0.0-2 and onwards

Impact of CVE-2020-5135

It is feasible to change some system files or information, but the attacker has no control over what can be changed, or the scope of what the attacker can affect is limited. There is a decrease in performance or a disruption in the availability of resources.

CVE ID CVE-2020-5135
Vulnerability Name SonicWall SonicOS Buffer Overflow Vulnerability
Vendor  SonicWall
Product SonicOS
Description By sending a malicious request to the firewall, a remote attacker can cause a Denial of Service (DoS) and potentially execute arbitrary code due to a buffer overflow vulnerability in SonicOS.
Date added to the catalog 2022-03-15 
Severity (scale of 10) 9.8 (Critical)
Remediation As temporary mitigation, SSL VPN portals may be removed from the Internet before the patch is applied.

What is CVE-2019-1405?

Microsoft Windows UPnP Service Privilege Escalation Vulnerability

When the Windows Universal Plug and Play (UPnP) service incorrectly authorizes COM object creation, an elevation of privilege vulnerability exists.

An attacker who successfully exploited this flaw may use elevated system access to launch arbitrary code. After that, an attacker might install applications, read, alter, remove data, or create new accounts with full user rights. An attacker would need to enter into an affected system and run a specially designed script or program to exploit this vulnerability.

The vulnerability is fixed by changing how the Windows UPnP service accesses COM objects.
It is extremely harmful to businesses because there are numerous ways to acquire access to any system within a company. In an organization with a domain controller, for example, every user with physical access to the domain can log in to any machine in the domain.

He can only access data on the machine that is exclusive to his user account.

Cyber Security Services
End-to-End Proactive Solutions for empowering Advanced Threat Protection and Intelligence with Real-Time Analytics, Cyber Security Services

Impact of CVE-2019-1405

Computers running Microsoft Windows 10 1803 are vulnerable to these flaws.

The integrity of the system has been completely compromised. The system's protection has been completely lost, putting the entire system at risk. The impacted resource has been completely shut down. The attacker has the ability to make the resource utterly unusable.

CVE ID CVE-2019-1405
Vulnerability Name Microsoft Windows UPnP Service Privilege Escalation Vulnerability
Vendor  Microsoft
Product Windows Universal Plug and Play (UPnP)
Description When the Windows UPnP service incorrectly authorizes COM object creation, an elevation of privilege vulnerability arises.
Date added to the catalog 2022-03-15
Severity (scale of 10) 7.8 ( High)
Remediation Only allow trusted individuals local access.
Use limited contexts and shells whenever possible.
Make sure only trustworthy users have local, interactive access to the computers in question.

Conclusion

SonicOS authorizes a remote attacker to force Denial of Service (DoS) and potentially execute arbitrary code by sending a malicious request to the firewall and UPnP vulnerability improperly authorizes COM object creation, aka "Windows UPnP Service Elevation of Privilege Vulnerability".

Explore more critical vulnerabilities that can be leveraged by Adversaries in hacking your applications and their remediations