Vulnerability Name: | CVE-2021-20043 (CCN-214760) | ||||||||||||
Assigned: | 2020-12-17 | ||||||||||||
Published: | 2021-12-07 | ||||||||||||
Updated: | 2021-12-10 | ||||||||||||
Summary: | A Heap-based buffer overflow vulnerability in SonicWall SMA100 getBookmarks method allows a remote authenticated attacker to potentially execute code as the nobody user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances. | ||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-787 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-20043 Source: XF Type: UNKNOWN sonicwall-cve202120043-bo(214760) Source: CCN Type: SonicWall Security Advisory SNWLID-2021-0026 SonicWall patches multiple SMA100 affected vulnerabilities Source: CONFIRM Type: Vendor Advisory https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0026 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration 5: Configuration CCN 1: ![]() | ||||||||||||
BACK |