CVE-2021-20038

Published Dec 8, 2021

Last updated 3 years ago

Overview

Description
A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions.
Source
PSIRT@sonicwall.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

CVSS 2.0

Type
Primary
Base score
7.5
Impact score
6.4
Exploitability score
10
Vector string
AV:N/AC:L/Au:N/C:P/I:P/A:P

Known exploits

Data from CISA

Vulnerability name
SonicWall SMA 100 Appliances Stack-Based Buffer Overflow Vulnerability
Exploit added on
Jan 28, 2022
Exploit action due
Feb 11, 2022
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-787
PSIRT@sonicwall.com
CWE-121

Social media

Hype score
Not currently trending

Configurations