Lucene search

K
cve[email protected]CVE-2021-20041
HistoryDec 08, 2021 - 10:15 a.m.

CVE-2021-20041

2021-12-0810:15:08
CWE-835
web.nvd.nist.gov
28
cve-2021-20041
unauthenticated access
remote exploit
cpu consumption
sma appliances
nvd
security vulnerability

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8.5 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

70.0%

An unauthenticated and remote adversary can consume all of the device’s CPU due to crafted HTTP requests sent to SMA100 /fileshare/sonicfiles/sonicfiles resulting in a loop with unreachable exit condition. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

Affected configurations

NVD
Node
sonicwallsma_200_firmwareMatch9.0.0.11-31sv
OR
sonicwallsma_200_firmwareMatch10.2.0.8-37sv
OR
sonicwallsma_200_firmwareMatch10.2.1.1-19sv
AND
sonicwallsma_200Match-
Node
sonicwallsma_210_firmwareMatch9.0.0.11-31sv
OR
sonicwallsma_210_firmwareMatch10.2.0.8-37sv
OR
sonicwallsma_210_firmwareMatch10.2.1.1-19sv
AND
sonicwallsma_210Match-
Node
sonicwallsma_410_firmwareMatch9.0.0.11-31sv
OR
sonicwallsma_410_firmwareMatch10.2.0.8-37sv
OR
sonicwallsma_410_firmwareMatch10.2.1.1-19sv
AND
sonicwallsma_410Match-
Node
sonicwallsma_400_firmwareMatch9.0.0.11-31sv
OR
sonicwallsma_400_firmwareMatch10.2.0.8-37sv
OR
sonicwallsma_400_firmwareMatch10.2.1.1-19sv
AND
sonicwallsma_400Match-
Node
sonicwallsma_500v_firmwareMatch9.0.0.11-31sv
OR
sonicwallsma_500v_firmwareMatch10.2.0.8-37sv
OR
sonicwallsma_500v_firmwareMatch10.2.1.1-19sv
AND
sonicwallsma_500vMatch-

CNA Affected

[
  {
    "product": "SonicWall SMA100",
    "vendor": "SonicWall",
    "versions": [
      {
        "status": "affected",
        "version": "9.0.0.11-31sv and earlier"
      },
      {
        "status": "affected",
        "version": "10.2.0.8-37sv and earlier"
      },
      {
        "status": "affected",
        "version": "10.2.1.1-19sv and earlier"
      },
      {
        "status": "affected",
        "version": "10.2.1.2-24sv and earlier"
      }
    ]
  }
]

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8.5 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

70.0%