First published: Fri Apr 09 2021(Updated: )
SonicWall Email Security contains an improper privilege management vulnerability that allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host. This vulnerability has known usage in a SonicWall Email Security exploit chain along with CVE-2021-20022 and CVE-2021-20023 to achieve privilege escalation.
Credit: PSIRT@sonicwall.com PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall Email Security | <10.0.9.6103 | |
Sonicwall Hosted Email Security | <10.0.9.6103 | |
<10.0.9.6103 | ||
<10.0.9.6103 | ||
SonicWall SonicWall Email Security |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20021 is an improper privilege management vulnerability in SonicWall Email Security that allows an attacker to create an administrative account.
CVE-2021-20021 has a severity rating of 9.8, indicating it is a critical vulnerability.
SonicWall Email Security versions up to 10.0.9.6103, SonicWall Hosted Email Security versions up to 10.0.9.6103.
An attacker can exploit CVE-2021-20021 by sending a crafted HTTP request to the remote host and creating an administrative account.
You can find more information about CVE-2021-20021 on the SonicWall PSIRT website: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0007