First published: Thu Dec 23 2021(Updated: )
A vulnerability in SonicWall SMA100 password change API allows a remote unauthenticated attacker to perform SMA100 username enumeration based on the server responses. This vulnerability impacts 10.2.1.2-24sv, 10.2.0.8-37sv and earlier 10.x versions.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sonicwall Sma 100 Firmware | <10.0.0.0 | |
Sonicwall Sma 100 Firmware | =10.2.0.8-37sv | |
Sonicwall Sma 100 Firmware | =10.2.1.2-24sv | |
SonicWall SMA100 | ||
Sonicwall Sma 200 Firmware | <10.0.0.0 | |
Sonicwall Sma 200 Firmware | =10.2.0.8-37sv | |
Sonicwall Sma 200 Firmware | =10.2.1.2-24sv | |
Sonicwall Sma200 | ||
Sonicwall Sma 210 Firmware | <10.0.0.0 | |
Sonicwall Sma 210 Firmware | =10.2.0.8-37sv | |
Sonicwall Sma 210 Firmware | =10.2.1.2-24sv | |
Sonicwall Sma210 | ||
Sonicwall Sma 400 Firmware | <10.0.0.0 | |
Sonicwall Sma 400 Firmware | =10.2.0.8-37sv | |
Sonicwall Sma 400 Firmware | =10.2.1.2-24sv | |
Sonicwall Sma400 | ||
Sonicwall Sma 410 Firmware | <10.0.0.0 | |
Sonicwall Sma 410 Firmware | =10.2.0.8-37sv | |
Sonicwall Sma 410 Firmware | =10.2.1.2-24sv | |
Sonicwall Sma410 | ||
Sonicwall Sma 500v Firmware | <10.0.0.0 | |
Sonicwall Sma 500v Firmware | =10.2.0.8-37sv | |
Sonicwall Sma 500v Firmware | =10.2.1.2-24sv | |
Sonicwall Sma500v |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-20049 is high, with a severity value of 7.5.
SonicWall SMA100 firmware versions 10.2.1.2-24sv, 10.2.0.8-37sv, and earlier 10.x versions are affected by CVE-2021-20049.
The vulnerability in SonicWall SMA100 password change API allows a remote unauthenticated attacker to perform SMA100 username enumeration based on the server responses.
No, the SonicWall SMA200 firmware is not affected by CVE-2021-20049.
To fix the CVE-2021-20049 vulnerability in SonicWall SMA100, update to a version that is not affected, such as 10.2.1.2-25sv.