A vulnerability in SonicWall SMA100 password change API allows a remote unauthenticated attacker to perform SMA100 username enumeration based on the server responses. This vulnerability impacts 10.2.1.2-24sv, 10.2.0.8-37sv and earlier 10.x versions.
2021-12-23T02:15:06.583
2024-11-21T05:45:51.337
Modified
CVSSv3.1: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:N/A:N
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | sonicwall | sma_100_firmware | < 10.0.0.0 | Yes |
Operating System | sonicwall | sma_100_firmware | 10.2.0.8-37sv | Yes |
Operating System | sonicwall | sma_100_firmware | 10.2.1.2-24sv | Yes |
Hardware | sonicwall | sma100 | - | No |
Operating System | sonicwall | sma_200_firmware | < 10.0.0.0 | Yes |
Operating System | sonicwall | sma_200_firmware | 10.2.0.8-37sv | Yes |
Operating System | sonicwall | sma_200_firmware | 10.2.1.2-24sv | Yes |
Hardware | sonicwall | sma200 | - | No |
Operating System | sonicwall | sma_210_firmware | < 10.0.0.0 | Yes |
Operating System | sonicwall | sma_210_firmware | 10.2.0.8-37sv | Yes |
Operating System | sonicwall | sma_210_firmware | 10.2.1.2-24sv | Yes |
Hardware | sonicwall | sma210 | - | No |
Operating System | sonicwall | sma_400_firmware | < 10.0.0.0 | Yes |
Operating System | sonicwall | sma_400_firmware | 10.2.0.8-37sv | Yes |
Operating System | sonicwall | sma_400_firmware | 10.2.1.2-24sv | Yes |
Hardware | sonicwall | sma400 | - | No |
Operating System | sonicwall | sma_410_firmware | < 10.0.0.0 | Yes |
Operating System | sonicwall | sma_410_firmware | 10.2.0.8-37sv | Yes |
Operating System | sonicwall | sma_410_firmware | 10.2.1.2-24sv | Yes |
Hardware | sonicwall | sma410 | - | No |
Operating System | sonicwall | sma_500v_firmware | < 10.0.0.0 | Yes |
Operating System | sonicwall | sma_500v_firmware | 10.2.0.8-37sv | Yes |
Operating System | sonicwall | sma_500v_firmware | 10.2.1.2-24sv | Yes |
Hardware | sonicwall | sma500v | - | No |