First published: Tue Apr 20 2021(Updated: )
SonicWall Email Security version 10.0.9.x contains a vulnerability that allows a post-authenticated attacker to read an arbitrary file on the remote host.
Credit: PSIRT@sonicwall.com PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sonicwall Email Security | <10.0.9.6173 | |
Sonicwall Email Security | <10.0.9.6173 | |
Sonicwall Hosted Email Security | <10.0.9.6173 | |
<10.0.9.6173 | ||
<10.0.9.6173 | ||
<10.0.9.6173 | ||
SonicWall SonicWall Email Security |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20023 is a path traversal vulnerability in SonicWall Email Security that allows an authenticated attacker to read files on the remote host.
CVE-2021-20023 has a severity rating of 4.9 out of 10, which is considered medium.
SonicWall Email Security versions up to 10.0.9.6173, SonicWall Email Security Virtual Appliance, Sonicwall Email Security for Windows, and Sonicwall Hosted Email Security versions up to 10.0.9.6173 are affected by CVE-2021-20023.
An attacker with post-authentication can exploit CVE-2021-20023 to read files on the remote host, especially when combined with CVE-2021-20021 and CVE-2021-20022 for privilege escalation.
To fix CVE-2021-20023, users should update to SonicWall Email Security version 10.0.9.6173 or higher.