First published: Thu Dec 23 2021(Updated: )
An Improper Access Control Vulnerability in the SMA100 series leads to multiple restricted management APIs being accessible without a user login, potentially exposing configuration meta-data.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sonicwall Sma 100 Firmware | <10.0.0.0 | |
Sonicwall Sma 100 Firmware | =10.2.0.8-37sv | |
Sonicwall Sma 100 Firmware | =10.2.1.2-24sv | |
SonicWall SMA100 | ||
Sonicwall Sma 200 Firmware | <10.0.0.0 | |
Sonicwall Sma 200 Firmware | =10.2.0.8-37sv | |
Sonicwall Sma 200 Firmware | =10.2.1.2-24sv | |
Sonicwall Sma200 | ||
Sonicwall Sma 210 Firmware | <10.0.0.0 | |
Sonicwall Sma 210 Firmware | =10.2.0.8-37sv | |
Sonicwall Sma 210 Firmware | =10.2.1.2-24sv | |
Sonicwall Sma210 | ||
Sonicwall Sma 400 Firmware | <10.0.0.0 | |
Sonicwall Sma 400 Firmware | =10.2.0.8-37sv | |
Sonicwall Sma 400 Firmware | =10.2.1.2-24sv | |
Sonicwall Sma400 | ||
Sonicwall Sma 410 Firmware | <10.0.0.0 | |
Sonicwall Sma 410 Firmware | =10.2.0.8-37sv | |
Sonicwall Sma 410 Firmware | =10.2.1.2-24sv | |
Sonicwall Sma410 | ||
Sonicwall Sma 500v Firmware | <10.0.0.0 | |
Sonicwall Sma 500v Firmware | =10.2.0.8-37sv | |
Sonicwall Sma 500v Firmware | =10.2.1.2-24sv | |
Sonicwall Sma500v |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20050 is an Improper Access Control Vulnerability in the SMA100 series that leads to multiple restricted management APIs being accessible without a user login.
The severity of CVE-2021-20050 is high (7.5).
Sonicwall SMA 100, SMA 200, SMA 210, SMA 400, SMA 410, and SMA 500v with specific firmware versions are affected by CVE-2021-20050.
To fix CVE-2021-20050, Sonicwall users should update their SMA series firmware to the patched versions mentioned in the Sonicwall advisory.
You can find more information about CVE-2021-20050 on the Sonicwall advisory page: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0031.