First published: Wed Dec 08 2021(Updated: )
A relative path traversal vulnerability in the SMA100 upload funtion allows a remote unauthenticated attacker to upload crafted web pages or files as a 'nobody' user. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall SMA 200 firmware | =10.2.0.8-37sv | |
SonicWall SMA 200 firmware | =10.2.1.1-19sv | |
SonicWall SMA 200 firmware | ||
SonicWall SMA 210 | =10.2.0.8-37sv | |
SonicWall SMA 210 | =10.2.1.1-19sv | |
SonicWall SMA 210 Firmware | ||
SonicWall SMA 410 | =10.2.0.8-37sv | |
SonicWall SMA 410 | =10.2.1.1-19sv | |
SonicWall SMA 410 | ||
SonicWall SMA 400 firmware | =10.2.0.8-37sv | |
SonicWall SMA 400 firmware | =10.2.1.1-19sv | |
SonicWall SMA 400 firmware | ||
SonicWall SMA 500v Firmware | =10.2.0.8-37sv | |
SonicWall SMA 500v Firmware | =10.2.1.1-19sv | |
SonicWall SMA 500v Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-20040.
The affected software includes Sonicwall SMA 200 firmware version 10.2.0.8-37sv, Sonicwall SMA 210 firmware version 10.2.0.8-37sv, Sonicwall SMA 400 firmware version 10.2.0.8-37sv, Sonicwall SMA 410 firmware version 10.2.0.8-37sv, and Sonicwall SMA 500v firmware version 10.2.0.8-37sv.
The severity of CVE-2021-20040 is high, with a CVSS score of 7.5.
The vulnerability allows a remote unauthenticated attacker to upload crafted web pages or files as a 'nobody' user, exploiting a relative path traversal vulnerability.
To mitigate this vulnerability, apply the necessary patches or firmware updates provided by Sonicwall. Ensure that your SMA appliances have the latest firmware versions installed.