Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-20042


An unauthenticated remote attacker can use SMA 100 as an unintended proxy or intermediary undetectable proxy to bypass firewall rules. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.


Published

2021-12-08T10:15:08.053

Last Modified

2024-11-21T05:45:50.413

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Secondary
    CWE-441
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System sonicwall sma_200_firmware 9.0.0.11-31sv Yes
Operating System sonicwall sma_200_firmware 10.2.0.8-37sv Yes
Operating System sonicwall sma_200_firmware 10.2.1.1-19sv Yes
Hardware sonicwall sma_200 - No
Operating System sonicwall sma_210_firmware 9.0.0.11-31sv Yes
Operating System sonicwall sma_210_firmware 10.2.0.8-37sv Yes
Operating System sonicwall sma_210_firmware 10.2.1.1-19sv Yes
Hardware sonicwall sma_210 - No
Operating System sonicwall sma_410_firmware 9.0.0.11-31sv Yes
Operating System sonicwall sma_410_firmware 10.2.0.8-37sv Yes
Operating System sonicwall sma_410_firmware 10.2.1.1-19sv Yes
Hardware sonicwall sma_410 - No
Operating System sonicwall sma_400_firmware 9.0.0.11-31sv Yes
Operating System sonicwall sma_400_firmware 10.2.0.8-37sv Yes
Operating System sonicwall sma_400_firmware 10.2.1.1-19sv Yes
Hardware sonicwall sma_400 - No
Operating System sonicwall sma_500v_firmware 9.0.0.11-31sv Yes
Operating System sonicwall sma_500v_firmware 10.2.0.8-37sv Yes
Operating System sonicwall sma_500v_firmware 10.2.1.1-19sv Yes
Hardware sonicwall sma_500v - No

References