EX SSL-VPN: CSRF, MD5, Query Parameters & Session Identifier Exploit Vulnerabilities reported on Av
03/26/2020 4 8646
EX SSL-VPN: CSRF, MD5, Query Parameters & Session Identifier Exploit Vulnerabilities reported on Aventail Appliance and Status
Reported Vulnerabilities & Aventail Status:
1. Cross-Site Request Forgery
This reported vulnerability is based on the insufficient authentication methods used by any application.
The reported URL's are part of our user Logoff process and do not represent a threat to user or company data.
2. Session Identifier Not Updated
The reported vulnerability is related to insecure Web Application programming and configuration. It is possible to steal or manipulate customer session and cookies to impersonate a legitimate user.
SonicWall believes this to be a false positive. The page /__extraweb__authen' does not accept any identifiers or cookies that could impersonate a legitimate user.
3. Query Parameter in SSL Request
The following URL's may contain sensitive information and it may be possible to steal such data that are send unencrypted.
The vulnerability is due to query parameters that were passed over SSL. SonicWall does not consider this to be a leak of sensitive information, and considers this a false positive.
4. MD5 signed SSL Certificates
The following URL's were detected to use certificates signed with MD5 algorithm. MD5 Signature Algorithm is obsolete and it can result in Phishing attacks.
Workplace and AMC access by default maybe setup to use Self Signed Certificates during the initial setup. Before deploying it in production, customers are encouraged to use certificates that are signed by more secure algorithms like Sha1 or even SHA2.
For more details, please contact SonicWall Support.
Tracking ID: 138155