578
VMScore

CVE-2021-20043

Published: 08/12/2021 Updated: 10/12/2021
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

A Heap-based buffer overflow vulnerability in SonicWall SMA100 getBookmarks method allows a remote authenticated malicious user to potentially execute code as the nobody user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sonicwall sma_200_firmware 10.2.0.8-37sv

sonicwall sma_200_firmware 10.2.1.1-19sv

sonicwall sma_210_firmware 10.2.0.8-37sv

sonicwall sma_210_firmware 10.2.1.1-19sv

sonicwall sma_410_firmware 10.2.0.8-37sv

sonicwall sma_410_firmware 10.2.1.1-19sv

sonicwall sma_400_firmware 10.2.0.8-37sv

sonicwall sma_400_firmware 10.2.1.1-19sv

sonicwall sma_500v_firmware 10.2.0.8-37sv

sonicwall sma_500v_firmware 10.2.1.1-19sv

Recent Articles

Make sure you're up-to-date with Sonicwall SMA 100 VPN box patches – security hole exploit info is now out
The Register • Gareth Corfield • 11 Jan 2022

Get our weekly newsletter Nothing like topping off unauth'd remote code execution with a su password of ... password

Technical details and exploitation notes have been published for a remote-code-execution vulnerability in Sonicwall SMA 100 series VPN appliances. The information was released today by infosec outfit Rapid7. This comes about a month after Sonicwall issued a patch for the security hole, which was discovered and privately disclosed by Rapid7's Jake Baines to Sonicwall in October. If you haven't yet applied the update, now would be a good time before it's widely exploited. So far there is no eviden...