First published: Wed Dec 08 2021(Updated: )
A buffer overflow vulnerability in SMA100 sonicfiles RAC_COPY_TO (RacNumber 36) method allows a remote unauthenticated attacker to potentially execute code as the 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall SMA 200 firmware | =10.2.0.8-37sv | |
SonicWall SMA 200 firmware | =10.2.1.1-19sv | |
SonicWall SMA 200 firmware | ||
SonicWall SMA 210 | =10.2.0.8-37sv | |
SonicWall SMA 210 | =10.2.1.1-19sv | |
SonicWall SMA 210 Firmware | ||
SonicWall SMA 410 | =10.2.0.8-37sv | |
SonicWall SMA 410 | =10.2.1.1-19sv | |
SonicWall SMA 410 | ||
SonicWall SMA 400 firmware | =10.2.0.8-37sv | |
SonicWall SMA 400 firmware | =10.2.1.1-19sv | |
SonicWall SMA 400 firmware | ||
SonicWall SMA 500v Firmware | =10.2.0.8-37sv | |
SonicWall SMA 500v Firmware | =10.2.1.1-19sv | |
SonicWall SMA 500v Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20045 is a buffer overflow vulnerability in the SMA100 sonicfiles RAC_COPY_TO (RacNumber 36) method.
CVE-2021-20045 affects SMA 200, 210, 400, 410, and 500v appliances.
CVE-2021-20045 has a severity rating of 9.8 (critical).
CVE-2021-20045 can be exploited by a remote unauthenticated attacker to potentially execute code as the 'nobody' user in the appliance.
More information about CVE-2021-20045 can be found at the following reference: [link](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0026)