Remote Access Vulnerability in SonicWall Email Security Virtual Appliance
CVE-2021-20025
7.8HIGH
Key Information:
- Vendor
- Sonicwall
- Vendor
- CVE Published:
- 13 May 2021
Summary
The SonicWall Email Security Virtual Appliance versions up to 10.0.9 are vulnerable due to a default username and password set during initial setup. This configuration poses a significant risk as it enables attackers to exploit this transitional user account for unauthorized remote access, provided the appliance is freshly installed and has not yet connected to Mysonicwall. Security measures should include changing default credentials and ensuring proper network isolation during setup.
Affected Version(s)
Email Security Virtual Appliance 10.0.9 and earlier
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved