Security News > 2021 > December > It’s time to patch your SonicWall SMA 100 series appliances again!

It’s time to patch your SonicWall SMA 100 series appliances again!
2021-12-09 09:17

SonicWall has fixed a handful of vulnerabilities affecting its SMA 100 series appliances and is urging organizations to implement the patches as soon as possible.

Although there's currently no evidence of these bugs being exploited in active attacks, threat actors have been known to target these appliances in the past by leveraging known and zero-day vulnerabilities.

The patched vulnerabilities, which were reported by Jake Baines of Rapid7 and Richard Warren of NCC Group received incremental identifiers from CVE-2021-20038 up to CVE-2021-20045.

"CVE-2021-20038 covers a single vulnerability and received a CVSSv3 score of 9.8, while CVE-2021-20045 covers multiple vulnerabilities, the bundle received at CVSSv3 score of 9.4. CVE-2021-20038 is the result of using strcat() function when handling environment variables from the HTTP GET method used in the SMA SSLVPN Apache httpd server. CVE-2021-20043 is also a heap-based buffer overflow and it received a CVSSv3 score of 8.8, but it requires authentication to exploit. For all three of these CVEs, successful exploitation would result in code execution as the 'nobody' user in the SMA100 appliance."

More specific details about the flaws have been made available by SonicWall's PSIRT. The vulnerabilities affect the whole SMA 100 series, i.e., SMA 200, 210, 400, 410 and 500v appliances running various firmware versions.

SMA 100 series appliances with WAF enabled are also impacted by the majority of these vulnerabilities.


News URL

https://www.helpnetsecurity.com/2021/12/09/sonicwall-sma-vulnerabilities/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2021-12-08 CVE-2021-20045 Classic Buffer Overflow vulnerability in Sonicwall products
A buffer overflow vulnerability in SMA100 sonicfiles RAC_COPY_TO (RacNumber 36) method allows a remote unauthenticated attacker to potentially execute code as the 'nobody' user in the appliance.
network
low complexity
sonicwall CWE-120
critical
9.8
2021-12-08 CVE-2021-20043 Out-of-bounds Write vulnerability in Sonicwall products
A Heap-based buffer overflow vulnerability in SonicWall SMA100 getBookmarks method allows a remote authenticated attacker to potentially execute code as the nobody user in the appliance.
network
low complexity
sonicwall CWE-787
8.8
2021-12-08 CVE-2021-20038 Out-of-bounds Write vulnerability in Sonicwall products
A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance.
network
low complexity
sonicwall CWE-787
critical
9.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Sonicwall 113 0 40 74 38 152
SMA 42 0 0 8 8 16