Remote Access Vulnerability in SonicWall Email Security Virtual Appliance
CVE-2021-20025
Key Information:
- Vendor
Sonicwall
- Vendor
- CVE Published:
- 13 May 2021
What is CVE-2021-20025?
The SonicWall Email Security Virtual Appliance versions up to 10.0.9 are vulnerable due to a default username and password set during initial setup. This configuration poses a significant risk as it enables attackers to exploit this transitional user account for unauthorized remote access, provided the appliance is freshly installed and has not yet connected to Mysonicwall. Security measures should include changing default credentials and ensuring proper network isolation during setup.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Email Security Virtual Appliance 10.0.9 and earlier
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved