A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions.
2021-12-08T10:15:07.750
2025-03-14T16:48:26.593
Analyzed
CVSSv3.1: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | sonicwall | sma_200_firmware | 10.2.0.8-37sv | Yes |
Operating System | sonicwall | sma_200_firmware | 10.2.1.1-19sv | Yes |
Operating System | sonicwall | sma_200_firmware | 10.2.1.2-24sv | Yes |
Hardware | sonicwall | sma_200 | - | No |
Operating System | sonicwall | sma_210_firmware | 10.2.0.8-37sv | Yes |
Operating System | sonicwall | sma_210_firmware | 10.2.1.1-19sv | Yes |
Operating System | sonicwall | sma_210_firmware | 10.2.1.2-24sv | Yes |
Hardware | sonicwall | sma_210 | - | No |
Operating System | sonicwall | sma_410_firmware | 10.2.0.8-37sv | Yes |
Operating System | sonicwall | sma_410_firmware | 10.2.1.1-19sv | Yes |
Operating System | sonicwall | sma_410_firmware | 10.2.1.2-24sv | Yes |
Hardware | sonicwall | sma_410 | - | No |
Operating System | sonicwall | sma_400_firmware | 10.2.0.8-37sv | Yes |
Operating System | sonicwall | sma_400_firmware | 10.2.1.1-19sv | Yes |
Operating System | sonicwall | sma_400_firmware | 10.2.1.2-24sv | Yes |
Hardware | sonicwall | sma_400 | - | No |
Operating System | sonicwall | sma_500v_firmware | 10.2.0.8-37sv | Yes |
Operating System | sonicwall | sma_500v_firmware | 10.2.1.1-19sv | Yes |
Operating System | sonicwall | sma_500v_firmware | 10.2.1.2-24sv | Yes |
Hardware | sonicwall | sma_500v | - | No |