First published: Wed Dec 08 2021(Updated: )
A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions.
Credit: PSIRT@sonicwall.com PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall SMA100 SSLVPN | ||
SonicWall SMA 200 firmware | =10.2.0.8-37sv | |
SonicWall SMA 200 firmware | =10.2.1.1-19sv | |
SonicWall SMA 200 firmware | =10.2.1.2-24sv | |
SonicWall SMA 200 firmware | ||
SonicWall SMA 210 | =10.2.0.8-37sv | |
SonicWall SMA 210 | =10.2.1.1-19sv | |
SonicWall SMA 210 | =10.2.1.2-24sv | |
SonicWall SMA 210 Firmware | ||
SonicWall SMA 410 | =10.2.0.8-37sv | |
SonicWall SMA 410 | =10.2.1.1-19sv | |
SonicWall SMA 410 | =10.2.1.2-24sv | |
SonicWall SMA 410 | ||
SonicWall SMA 400 firmware | =10.2.0.8-37sv | |
SonicWall SMA 400 firmware | =10.2.1.1-19sv | |
SonicWall SMA 400 firmware | =10.2.1.2-24sv | |
SonicWall SMA 400 firmware | ||
SonicWall SMA 500v Firmware | =10.2.0.8-37sv | |
SonicWall SMA 500v Firmware | =10.2.1.1-19sv | |
SonicWall SMA 500v Firmware | =10.2.1.2-24sv | |
SonicWall SMA 500v Firmware | ||
All of | ||
Any of | ||
SonicWall SMA 200 firmware | =10.2.0.8-37sv | |
SonicWall SMA 200 firmware | =10.2.1.1-19sv | |
SonicWall SMA 200 firmware | =10.2.1.2-24sv | |
SonicWall SMA 200 firmware | ||
All of | ||
Any of | ||
SonicWall SMA 210 | =10.2.0.8-37sv | |
SonicWall SMA 210 | =10.2.1.1-19sv | |
SonicWall SMA 210 | =10.2.1.2-24sv | |
SonicWall SMA 210 Firmware | ||
All of | ||
Any of | ||
SonicWall SMA 410 | =10.2.0.8-37sv | |
SonicWall SMA 410 | =10.2.1.1-19sv | |
SonicWall SMA 410 | =10.2.1.2-24sv | |
SonicWall SMA 410 | ||
All of | ||
Any of | ||
SonicWall SMA 400 firmware | =10.2.0.8-37sv | |
SonicWall SMA 400 firmware | =10.2.1.1-19sv | |
SonicWall SMA 400 firmware | =10.2.1.2-24sv | |
SonicWall SMA 400 firmware | ||
All of | ||
Any of | ||
SonicWall SMA 500v Firmware | =10.2.0.8-37sv | |
SonicWall SMA 500v Firmware | =10.2.1.1-19sv | |
SonicWall SMA 500v Firmware | =10.2.1.2-24sv | |
SonicWall SMA 500v Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the SonicWall SMA 100 Appliances stack-based buffer overflow vulnerability is CVE-2021-20038.
The severity of CVE-2021-20038 is critical with a CVSS score of 9.8.
SonicWall SMA 200, 210, 400, 410, and 500v appliances firmware versions 10.2.0.8-37sv, 10.2.1.1-19sv, and 10.2.1.2-24sv are affected by CVE-2021-20038.
A remote unauthenticated attacker can exploit CVE-2021-20038 by exploiting a stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables, potentially executing code as a 'nobody' user on the affected appliance.
Yes, SonicWall SMA 200, 210, 400, 410, and 500v appliances are vulnerable to CVE-2021-20038 if they are running the affected firmware versions.