First published: Fri Jan 07 2022(Updated: )
A Stack-based buffer overflow in the SonicOS HTTP Content-Length response header allows a remote authenticated attacker to cause Denial of Service (DoS) and potentially results in code execution in the firewall. This vulnerability affected SonicOS Gen 5, Gen 6 and Gen 7 firmware versions.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall SonicOS | <=7.0.1-r146 | |
SonicWall NSA 2650 | ||
SonicWall NSA 2700 | ||
SonicWall NSA 3650 Firmware | ||
SonicWall NSA 3700 Firmware | ||
SonicWall NSA 4650 Firmware | ||
SonicWall NSA 4700 | ||
SonicWall NSA 5650 | ||
SonicWall NSA 6650 | ||
SonicWall NSA 6700 Firmware | ||
SonicWall NSA 9250 | ||
SonicWall NSA 9450 | ||
SonicWall NSA 9650 | ||
SonicWall TZ270 | ||
SonicWall TZ270W Firmware | ||
SonicWall TZ300 Firmware | ||
SonicWall TZ300P Firmware | ||
SonicWall TZ300W Firmware | ||
SonicWall TZ350 Firmware | ||
SonicWall TZ350W Firmware | ||
SonicWall TZ370 | ||
SonicWall TZ370W Firmware | ||
SonicWall TZ400W Firmware | ||
SonicWall TZ400W Firmware | ||
SonicWall TZ470 Firmware | ||
SonicWall TZ470W Firmware | ||
SonicWall TZ500W | ||
SonicWall TZ500W Firmware | ||
SonicWall TZ570 Firmware | ||
SonicWall TZ570P Firmware | ||
SonicWall TZ570W Firmware | ||
SonicWall TZ600 | ||
SonicWall TZ 600P | ||
SonicWall TZ670 Firmware | ||
SonicWall SonicOS | <=7.0.1-5023-1349 | |
SonicWall NSV 10 Firmware | ||
SonicWall NSV 100 Firmware | ||
SonicWall NSV 1600 | ||
SonicWall NSv | ||
SonicWall NSv 25 | ||
SonicWall NSV 270 | ||
SonicWall NSV 300 | ||
SonicWall NSV 400 Firmware | ||
SonicWall NSV 470 Firmware | ||
SonicWall NSV 50 Firmware | ||
SonicWall NSV800 | ||
SonicWall NSv 870 | ||
SonicWall SonicOS | <=7.0.1-5018-r1715 | |
SonicWall NSSP 12400 Firmware | ||
SonicWall NSSP 12800 Firmware | ||
SonicWall NSSP 13700 | ||
SonicWall NSSP 15700 | ||
SonicWall SonicOS | <=6.5.4.8-89n | |
SonicWall SOHO 250W Firmware | ||
SonicWall SuperMassive 9200 | ||
SonicWall SuperMassive 9400 | ||
SonicWall SuperMassive 9600 | ||
SonicWall SuperMassive 9800 | ||
SonicWall SonicOS | <=6.5.1.13-1n | |
SonicWall SonicOS | <=6.0.5.3-94o | |
SonicWall SuperMassive E10200 | ||
SonicWall SuperMassive E10400 | ||
SonicWall SuperMassive E10800 | ||
SonicWall SonicOS | >=5.0.0.0<=5.9.1.13 | |
SonicWall SOHO 250W |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20046 is a stack-based buffer overflow vulnerability in the SonicOS HTTP Content-Length response header.
CVE-2021-20046 affects SonicOS Gen 5, Gen 6, and Gen 7 firmware versions.
CVE-2021-20046 has a severity rating of 8.8 (high).
CVE-2021-20046 can be exploited by a remote authenticated attacker to cause denial of service (DoS) and potentially execute code in the firewall.
You can find more information about CVE-2021-20046 at the following link: [SonicWall PSIRT](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0027)