Files
CVEs-PoC/2018/CVE-2018-9867.md
T
2024-06-18 02:51:15 +02:00

19 lines
1.1 KiB
Markdown

### [CVE-2018-9867](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9867)
![](https://img.shields.io/static/v1?label=Product&message=SonicOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SonicOSv&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-285%3A%20Improper%20Authorization&color=brighgreen)
### Description
In SonicWall SonicOS, administrators without full permissions can download imported certificates. Occurs when administrators who are not in the SonicWall Administrators user group attempt to download imported certificates. This vulnerability affected SonicOS Gen 5 version 5.9.1.10 and earlier, Gen 6 version 6.2.7.3, 6.5.1.3, 6.5.2.2, 6.5.3.1, 6.2.7.8, 6.4.0.0, 6.5.1.8, 6.0.5.3-86o and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V).
### POC
#### Reference
- https://www.tenable.com/security/research/tra-2019-08
#### Github
No PoCs found on GitHub currently.