First published: Thu Dec 23 2021(Updated: )
A vulnerability in SonicWall SMA100 password change API allows a remote unauthenticated attacker to perform SMA100 username enumeration based on the server responses. This vulnerability impacts 10.2.1.2-24sv, 10.2.0.8-37sv and earlier 10.x versions.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall SMA 100 firmware | <10.0.0.0 | |
SonicWall SMA 100 firmware | =10.2.0.8-37sv | |
SonicWall SMA 100 firmware | =10.2.1.2-24sv | |
SonicWall SMA 100 | ||
SonicWall SMA 200 | <10.0.0.0 | |
SonicWall SMA 200 | =10.2.0.8-37sv | |
SonicWall SMA 200 | =10.2.1.2-24sv | |
SonicWall SMA 200 firmware | ||
SonicWall SMA 210 | <10.0.0.0 | |
SonicWall SMA 210 | =10.2.0.8-37sv | |
SonicWall SMA 210 | =10.2.1.2-24sv | |
SonicWall SMA 210 | ||
SonicWall SMA 400 | <10.0.0.0 | |
SonicWall SMA 400 | =10.2.0.8-37sv | |
SonicWall SMA 400 | =10.2.1.2-24sv | |
SonicWall SMA 400 | ||
SonicWall SMA 410 | <10.0.0.0 | |
SonicWall SMA 410 | =10.2.0.8-37sv | |
SonicWall SMA 410 | =10.2.1.2-24sv | |
SonicWall SMA 410 | ||
SonicWall SMA 500v Firmware | <10.0.0.0 | |
SonicWall SMA 500v Firmware | =10.2.0.8-37sv | |
SonicWall SMA 500v Firmware | =10.2.1.2-24sv | |
SonicWall SMA 500v |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-20049 is high, with a severity value of 7.5.
SonicWall SMA100 firmware versions 10.2.1.2-24sv, 10.2.0.8-37sv, and earlier 10.x versions are affected by CVE-2021-20049.
The vulnerability in SonicWall SMA100 password change API allows a remote unauthenticated attacker to perform SMA100 username enumeration based on the server responses.
No, the SonicWall SMA200 firmware is not affected by CVE-2021-20049.
To fix the CVE-2021-20049 vulnerability in SonicWall SMA100, update to a version that is not affected, such as 10.2.1.2-25sv.