First published: Mon Sep 27 2021(Updated: )
An improper access control vulnerability in SMA100 allows a remote unauthenticated attacker to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall SMA 200 firmware | <=9.0.0.10-28sv | |
SonicWall SMA 200 firmware | >=10.2.0.0<=10.2.0.7-34sv | |
SonicWall SMA 200 firmware | >=10.2.1.0<=10.2.1.0-17sv | |
SonicWall SMA 200 firmware | ||
SonicWall SMA 210 | <=9.0.0.10-28sv | |
SonicWall SMA 210 | >=10.2.0.0<=10.2.0.7-34sv | |
SonicWall SMA 210 | >=10.2.1.0<=10.2.1.0-17sv | |
SonicWall SMA 210 Firmware | ||
SonicWall SMA 400 firmware | <=9.0.0.10-28sv | |
SonicWall SMA 400 firmware | >=10.2.0.0<=10.2.0.7-34sv | |
SonicWall SMA 400 firmware | >=10.2.1.0<=10.2.1.0-17sv | |
SonicWall SMA 400 firmware | ||
SonicWall SMA 410 | <=9.0.0.10-28sv | |
SonicWall SMA 410 | >=10.2.0.0<=10.2.0.7-34sv | |
SonicWall SMA 410 | >=10.2.1.0<=10.2.1.0-17sv | |
SonicWall SMA 410 | ||
SonicWall SMA 500v Firmware | <=9.0.0.10-28sv | |
SonicWall SMA 500v Firmware | >=10.2.0.0<=10.2.0.7-34sv | |
SonicWall SMA 500v Firmware | >=10.2.1.0<=10.2.1.0-17sv |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-20034 is critical with a CVSS score of 9.1.
CVE-2021-20034 affects Sonicwall SMA 200, 210, 400, 410, and 500v firmware versions.
An attacker can exploit CVE-2021-20034 by bypassing the path traversal checks and deleting an arbitrary file on an affected device.
The impact of CVE-2021-20034 is the potential for an attacker to reboot the affected device to factory default settings.
Yes, Sonicwall has released firmware updates to address the vulnerability in SMA 200, 210, 400, 410, and 500v.