A buffer overflow vulnerability in SMA100 sonicfiles RAC_COPY_TO (RacNumber 36) method allows a remote unauthenticated attacker to potentially execute code as the 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.
2021-12-08T10:15:08.200
2024-11-21T05:45:50.773
Modified
CVSSv3.1: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | sonicwall | sma_200_firmware | 10.2.0.8-37sv | Yes |
Operating System | sonicwall | sma_200_firmware | 10.2.1.1-19sv | Yes |
Hardware | sonicwall | sma_200 | - | No |
Operating System | sonicwall | sma_210_firmware | 10.2.0.8-37sv | Yes |
Operating System | sonicwall | sma_210_firmware | 10.2.1.1-19sv | Yes |
Hardware | sonicwall | sma_210 | - | No |
Operating System | sonicwall | sma_410_firmware | 10.2.0.8-37sv | Yes |
Operating System | sonicwall | sma_410_firmware | 10.2.1.1-19sv | Yes |
Hardware | sonicwall | sma_410 | - | No |
Operating System | sonicwall | sma_400_firmware | 10.2.0.8-37sv | Yes |
Operating System | sonicwall | sma_400_firmware | 10.2.1.1-19sv | Yes |
Hardware | sonicwall | sma_400 | - | No |
Operating System | sonicwall | sma_500v_firmware | 10.2.0.8-37sv | Yes |
Operating System | sonicwall | sma_500v_firmware | 10.2.1.1-19sv | Yes |
Hardware | sonicwall | sma_500v | - | No |