Security News > 2021 > December > It’s time to patch your SonicWall SMA 100 series appliances again!
SonicWall has fixed a handful of vulnerabilities affecting its SMA 100 series appliances and is urging organizations to implement the patches as soon as possible.
Although there's currently no evidence of these bugs being exploited in active attacks, threat actors have been known to target these appliances in the past by leveraging known and zero-day vulnerabilities.
The patched vulnerabilities, which were reported by Jake Baines of Rapid7 and Richard Warren of NCC Group received incremental identifiers from CVE-2021-20038 up to CVE-2021-20045.
"CVE-2021-20038 covers a single vulnerability and received a CVSSv3 score of 9.8, while CVE-2021-20045 covers multiple vulnerabilities, the bundle received at CVSSv3 score of 9.4. CVE-2021-20038 is the result of using strcat() function when handling environment variables from the HTTP GET method used in the SMA SSLVPN Apache httpd server. CVE-2021-20043 is also a heap-based buffer overflow and it received a CVSSv3 score of 8.8, but it requires authentication to exploit. For all three of these CVEs, successful exploitation would result in code execution as the 'nobody' user in the SMA100 appliance."
More specific details about the flaws have been made available by SonicWall's PSIRT. The vulnerabilities affect the whole SMA 100 series, i.e., SMA 200, 210, 400, 410 and 500v appliances running various firmware versions.
SMA 100 series appliances with WAF enabled are also impacted by the majority of these vulnerabilities.
News URL
https://www.helpnetsecurity.com/2021/12/09/sonicwall-sma-vulnerabilities/
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-12-08 | CVE-2021-20045 | Classic Buffer Overflow vulnerability in Sonicwall products A buffer overflow vulnerability in SMA100 sonicfiles RAC_COPY_TO (RacNumber 36) method allows a remote unauthenticated attacker to potentially execute code as the 'nobody' user in the appliance. | 9.8 |
2021-12-08 | CVE-2021-20043 | Out-of-bounds Write vulnerability in Sonicwall products A Heap-based buffer overflow vulnerability in SonicWall SMA100 getBookmarks method allows a remote authenticated attacker to potentially execute code as the nobody user in the appliance. | 8.8 |
2021-12-08 | CVE-2021-20038 | Out-of-bounds Write vulnerability in Sonicwall products A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. | 9.8 |