A vulnerability in SonicWall SMA100 password change API allows a remote unauthenticated malicious user to perform SMA100 username enumeration based on the server responses. This vulnerability impacts 10.2.1.2-24sv, 10.2.0.8-37sv and previous versions 10.x versions.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
sonicwall sma_100_firmware 10.2.1.2-24sv |
||
sonicwall sma_100_firmware 10.2.0.8-37sv |
||
sonicwall sma_100_firmware |
||
sonicwall sma_200_firmware 10.2.0.8-37sv |
||
sonicwall sma_200_firmware 10.2.1.2-24sv |
||
sonicwall sma_200_firmware |
||
sonicwall sma_210_firmware 10.2.0.8-37sv |
||
sonicwall sma_210_firmware 10.2.1.2-24sv |
||
sonicwall sma_210_firmware |
||
sonicwall sma_400_firmware 10.2.0.8-37sv |
||
sonicwall sma_400_firmware 10.2.1.2-24sv |
||
sonicwall sma_400_firmware |
||
sonicwall sma_410_firmware 10.2.0.8-37sv |
||
sonicwall sma_410_firmware 10.2.1.2-24sv |
||
sonicwall sma_410_firmware |
||
sonicwall sma_500v_firmware 10.2.0.8-37sv |
||
sonicwall sma_500v_firmware 10.2.1.2-24sv |
||
sonicwall sma_500v_firmware |