An improper access control vulnerability in SMA100 allows a remote unauthenticated attacker to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.
2021-09-27T18:15:08.327
2024-11-21T05:45:49.503
Modified
CVSSv3.1: 9.1 (CRITICAL)
AV:N/AC:L/Au:N/C:N/I:P/A:P
10.0
4.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | sonicwall | sma_200_firmware | ≤ 9.0.0.10-28sv | Yes |
Operating System | sonicwall | sma_200_firmware | ≤ 10.2.0.7-34sv | Yes |
Operating System | sonicwall | sma_200_firmware | ≤ 10.2.1.0-17sv | Yes |
Hardware | sonicwall | sma_200 | - | No |
Operating System | sonicwall | sma_210_firmware | ≤ 9.0.0.10-28sv | Yes |
Operating System | sonicwall | sma_210_firmware | ≤ 10.2.0.7-34sv | Yes |
Operating System | sonicwall | sma_210_firmware | ≤ 10.2.1.0-17sv | Yes |
Hardware | sonicwall | sma_210 | - | No |
Operating System | sonicwall | sma_400_firmware | ≤ 9.0.0.10-28sv | Yes |
Operating System | sonicwall | sma_400_firmware | ≤ 10.2.0.7-34sv | Yes |
Operating System | sonicwall | sma_400_firmware | ≤ 10.2.1.0-17sv | Yes |
Hardware | sonicwall | sma_400 | - | No |
Operating System | sonicwall | sma_410_firmware | ≤ 9.0.0.10-28sv | Yes |
Operating System | sonicwall | sma_410_firmware | ≤ 10.2.0.7-34sv | Yes |
Operating System | sonicwall | sma_410_firmware | ≤ 10.2.1.0-17sv | Yes |
Hardware | sonicwall | sma_410 | - | No |
Application | sonicwall | sma_500v | ≤ 9.0.0.10-28sv | Yes |
Application | sonicwall | sma_500v | ≤ 10.2.0.7-34sv | Yes |
Application | sonicwall | sma_500v | ≤ 10.2.1.0-17sv | Yes |