First published: Thu Dec 23 2021(Updated: )
An Improper Access Control Vulnerability in the SMA100 series leads to multiple restricted management APIs being accessible without a user login, potentially exposing configuration meta-data.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall SMA 100 firmware | <10.0.0.0 | |
SonicWall SMA 100 firmware | =10.2.0.8-37sv | |
SonicWall SMA 100 firmware | =10.2.1.2-24sv | |
SonicWall SMA 100 | ||
SonicWall SMA 200 | <10.0.0.0 | |
SonicWall SMA 200 | =10.2.0.8-37sv | |
SonicWall SMA 200 | =10.2.1.2-24sv | |
SonicWall SMA 200 firmware | ||
SonicWall SMA 210 | <10.0.0.0 | |
SonicWall SMA 210 | =10.2.0.8-37sv | |
SonicWall SMA 210 | =10.2.1.2-24sv | |
SonicWall SMA 210 | ||
SonicWall SMA 400 | <10.0.0.0 | |
SonicWall SMA 400 | =10.2.0.8-37sv | |
SonicWall SMA 400 | =10.2.1.2-24sv | |
SonicWall SMA 400 | ||
SonicWall SMA 410 | <10.0.0.0 | |
SonicWall SMA 410 | =10.2.0.8-37sv | |
SonicWall SMA 410 | =10.2.1.2-24sv | |
SonicWall SMA 410 | ||
SonicWall SMA 500v Firmware | <10.0.0.0 | |
SonicWall SMA 500v Firmware | =10.2.0.8-37sv | |
SonicWall SMA 500v Firmware | =10.2.1.2-24sv | |
SonicWall SMA 500v |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20050 is an Improper Access Control Vulnerability in the SMA100 series that leads to multiple restricted management APIs being accessible without a user login.
The severity of CVE-2021-20050 is high (7.5).
Sonicwall SMA 100, SMA 200, SMA 210, SMA 400, SMA 410, and SMA 500v with specific firmware versions are affected by CVE-2021-20050.
To fix CVE-2021-20050, Sonicwall users should update their SMA series firmware to the patched versions mentioned in the Sonicwall advisory.
You can find more information about CVE-2021-20050 on the Sonicwall advisory page: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0031.