First published: Fri Jan 07 2022(Updated: )
A Stack-based buffer overflow in the SonicOS SessionID HTTP response header allows a remote authenticated attacker to cause Denial of Service (DoS) and potentially results in code execution in the firewall. This vulnerability affected SonicOS Gen 5, Gen 6 and Gen 7 firmware versions.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWALL SonicOS | <=7.0.1-r1456 | |
SonicWall NSA 2650 | ||
SonicWall NSA 2700 | ||
SonicWall NSA 3650 Firmware | ||
SonicWall NSA 3700 Firmware | ||
SonicWall NSA 4650 Firmware | ||
SonicWall NSA 4700 | ||
SonicWall NSA 5650 | ||
SonicWall NSA 6650 | ||
SonicWall NSA 6700 Firmware | ||
SonicWall NSA 9250 | ||
SonicWall NSA 9450 | ||
SonicWall NSA 9650 | ||
SonicWall TZ270 | ||
SonicWall TZ270W Firmware | ||
SonicWall TZ300 Firmware | ||
SonicWall TZ300P Firmware | ||
SonicWall TZ300W Firmware | ||
SonicWall TZ350 Firmware | ||
SonicWall TZ350W Firmware | ||
SonicWall TZ370 | ||
SonicWall TZ370W Firmware | ||
SonicWall TZ400W Firmware | ||
SonicWall TZ400W Firmware | ||
SonicWall TZ470 Firmware | ||
SonicWall TZ470W Firmware | ||
SonicWall TZ500W | ||
SonicWall TZ500W Firmware | ||
SonicWall TZ570 Firmware | ||
SonicWall TZ570P Firmware | ||
SonicWall TZ570W Firmware | ||
SonicWall TZ600 | ||
SonicWall TZ 600P | ||
SonicWall TZ670 Firmware | ||
SonicWALL SonicOS | <=7.0.1-5023-1349 | |
SonicWall NSV 10 Firmware | ||
SonicWall NSV 100 Firmware | ||
SonicWall NSV 1600 | ||
SonicWall NSv | ||
SonicWall NSV 25 | ||
SonicWall NSV 270 | ||
SonicWall NSV 300 | ||
SonicWall NSV 400 Firmware | ||
SonicWall NSV 470 Firmware | ||
SonicWall NSV 50 Firmware | ||
SonicWall NSV800 | ||
SonicWall NSv 870 | ||
SonicWALL SonicOS | <=7.0.1-5018-r1715 | |
SonicWall NSSP 12400 | ||
SonicWall NSSP 12800 | ||
SonicWall NSSP 13700 | ||
SonicWall NSSP 15700 | ||
SonicWALL SonicOS | <=6.5.4.8 | |
SonicWall SOHO 250W | ||
SonicWall SuperMassive 9200 | ||
SonicWall SuperMassive 9400 | ||
SonicWall SuperMassive 9600 | ||
SonicWall SuperMassive 9800 | ||
SonicWALL SonicOS | <=6.5.1.13-1n | |
SonicWALL SonicOS | <=6.0.5.3-94o | |
SonicWall SuperMassive E10200 | ||
Sonicwall Supermassive E10400 | ||
Sonicwall Supermassive E10800 | ||
SonicWALL SonicOS | <=5.9.1.13 | |
SonicWall SOHO 250W |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-20048.
The severity of CVE-2021-20048 is high with a CVSS score of 8.8.
SonicOS Gen 5, Gen 6, and Gen 7 firmware versions are affected by CVE-2021-20048.
CVE-2021-20048 allows a remote authenticated attacker to cause Denial of Service (DoS) and potentially results in code execution in the firewall.
You can find more information about CVE-2021-20048 at the following link: [SonicWall PSIRT](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0028).