First published: Fri Apr 09 2021(Updated: )
SonicWall Email Security contains an unrestricted upload of file with dangerous type vulnerability that allows a post-authenticated attacker to upload a file to the remote host. This vulnerability has known usage in a SonicWall Email Security exploit chain along with CVE-2021-20021 and CVE-2021-20023 to achieve privilege escalation.
Credit: PSIRT@sonicwall.com PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall Email Security | <10.0.9.6103 | |
Sonicwall Hosted Email Security | <10.0.9.6103 | |
<10.0.9.6103 | ||
<10.0.9.6103 | ||
SonicWall SonicWall Email Security |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20022 is a vulnerability in SonicWall Email Security that allows a post-authenticated attacker to upload a file to the remote host.
CVE-2021-20022 has a severity rating of 7.2 (high).
The affected software for CVE-2021-20022 is SonicWall Email Security version up to 10.0.9.6103.
The SonicWall Email Security unrestricted upload of file vulnerability can be exploited by a post-authenticated attacker to upload malicious files.
Yes, SonicWall has released a fix for CVE-2021-20022. It is recommended to update to the latest version of SonicWall Email Security.