Vulnerability Name: | CVE-2021-20049 (CCN-215992) | ||||||||||||
Assigned: | 2020-12-17 | ||||||||||||
Published: | 2021-12-21 | ||||||||||||
Updated: | 2022-07-08 | ||||||||||||
Summary: | A vulnerability in SonicWall SMA100 password change API allows a remote unauthenticated attacker to perform SMA100 username enumeration based on the server responses. This vulnerability impacts 10.2.1.2-24sv, 10.2.0.8-37sv and earlier 10.x versions. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-203 | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-20049 Source: XF Type: UNKNOWN sonicwall-cve202120049-info-disc(215992) Source: CCN Type: SonicWall Security Advisory SNWLID-2021-0030 SonicWall SMA100 API username enumeration vulnerability Source: CONFIRM Type: Vendor Advisory https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0030 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration 5: Configuration 6: ![]() | ||||||||||||
BACK |