CVE-2013-1360

Scores

EPSS

0.577medium57.7%
0%20%40%60%80%100%

Percentile: 57.7%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
10.0

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Description

An Authentication Bypass vulnerability exists in DELL SonicWALL Global Management System (GMS) 4.1, 5.0, 5.1, 6.0, and 7.0, Analyzer 7.0, Universal Management Appliance (UMA) 5.1, 6.0, and 7.0 and ViewPoint 4.1, 5.0, and 6.0 via a crafted request to the SGMS interface, which could let a remote malicious user obtain administrative access.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-287

Exploits

Exploit ID: 24203

Source: exploitdb

URL: https://www.exploit-db.com/exploits/24203

Vulnerable Software (4)

Type: Configuration

Vendor: *

Product: analyzer

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:sonicwall:analyzer:7.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:sonicwall:global_management_system:4.1:*...

Source: nvd

Type: Configuration

Vendor: *

Product: global_management_system

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:sonicwall:analyzer:7.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:sonicwall:global_management_system:4.1:*...

Source: nvd

Type: Configuration

Vendor: *

Product: universal_management_appliance

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:sonicwall:analyzer:7.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:sonicwall:global_management_system:4.1:*...

Source: nvd

Type: Configuration

Vendor: *

Product: viewpoint

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:sonicwall:analyzer:7.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:sonicwall:global_management_system:4.1:*...

Source: nvd

End of list