An unauthenticated and remote adversary can consume all of the device's CPU due to crafted HTTP requests sent to SMA100 /fileshare/sonicfiles/sonicfiles resulting in a loop with unreachable exit condition. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
sonicwall sma_200_firmware 9.0.0.11-31sv |
||
sonicwall sma_200_firmware 10.2.0.8-37sv |
||
sonicwall sma_200_firmware 10.2.1.1-19sv |
||
sonicwall sma_210_firmware 9.0.0.11-31sv |
||
sonicwall sma_210_firmware 10.2.0.8-37sv |
||
sonicwall sma_210_firmware 10.2.1.1-19sv |
||
sonicwall sma_410_firmware 9.0.0.11-31sv |
||
sonicwall sma_410_firmware 10.2.0.8-37sv |
||
sonicwall sma_410_firmware 10.2.1.1-19sv |
||
sonicwall sma_400_firmware 9.0.0.11-31sv |
||
sonicwall sma_400_firmware 10.2.0.8-37sv |
||
sonicwall sma_400_firmware 10.2.1.1-19sv |
||
sonicwall sma_500v_firmware 9.0.0.11-31sv |
||
sonicwall sma_500v_firmware 10.2.0.8-37sv |
||
sonicwall sma_500v_firmware 10.2.1.1-19sv |