First published: Thu May 13 2021(Updated: )
SonicWall Email Security Virtual Appliance version 10.0.9 and earlier versions contain a default username and a password that is used at initial setup. An attacker could exploit this transitional/temporary user account from the trusted domain to access the Virtual Appliance remotely only when the device is freshly installed and not connected to Mysonicwall.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall Email Security | <=10.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20025 has a moderate severity rating due to the exposure of default credentials.
To fix CVE-2021-20025, change the default username and password immediately after initial setup.
CVE-2021-20025 affects SonicWall Email Security Virtual Appliance version 10.0.9 and earlier.
Yes, CVE-2021-20025 can be exploited remotely using the default credentials during initial setup.
Yes, it is advisable to monitor logs for any unauthorized access attempts following the identification of CVE-2021-20025.