Vulnerability Name: | CVE-2021-20034 (CCN-210014) | ||||||||||||
Assigned: | 2020-12-17 | ||||||||||||
Published: | 2021-09-23 | ||||||||||||
Updated: | 2022-07-08 | ||||||||||||
Summary: | An improper access control vulnerability in SMA100 allows a remote unauthenticated attacker to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings. | ||||||||||||
CVSS v3 Severity: | 9.1 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H) 7.9 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C)
7.9 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-22 | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-20034 Source: MISC Type: Exploit, Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/164564/SonicWall-SMA-10.2.1.0-17sv-Password-Reset.html Source: XF Type: UNKNOWN sonicwall-cve202120034-sec-bypass(210014) Source: CCN Type: Packet Storm Security [10-20-2021] SonicWall SMA 10.2.1.0-17sv Password Reset Source: CCN Type: SonicWall Security Advisory: SNWLID-2021-0021 Unauthenticated SMA100 arbitrary file delete vulnerability Source: CONFIRM Type: Vendor Advisory https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0021 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [10-20-2021] | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration 5: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |