Command Injection Vulnerability in SMA100 Management Interface by SonicWall
CVE-2021-20035
Key Information:
Badges
What is CVE-2021-20035?
CVE-2021-20035 is a command injection vulnerability found in the SMA100 management interface developed by SonicWall. This product primarily serves as a secure access gateway, providing services such as remote access and secure connectivity for organizations. The vulnerability allows an authenticated remote attacker to execute arbitrary commands with the privileges of a 'nobody' user. This could have significant negative repercussions for organizations, as it opens avenues for unauthorized actions that can compromise system integrity and availability.
Technical Details
CVE-2021-20035 arises from improper neutralization of special elements within the SMA100 management interface. The flaw enables attackers who have obtained valid credentials to inject malicious commands. Given that the execution occurs under the permissions of a low-privileged user, the impact can be manipulated for various malicious intents, such as disrupting services or gaining elevated access indirectly.
Potential impact of CVE-2021-20035
-
Denial of Service (DoS): The vulnerability can lead to service disruptions, preventing authorized users from accessing the management interface and related services, thereby crippling operations.
-
System Integrity Compromise: Malicious commands executed via the vulnerability can alter system configurations or corrupt data, leading to unauthorized modifications that could affect compliance and operational stability.
-
Escalation of Privileges: Although the immediate impact is limited to a 'nobody' user, successful exploitation may allow attackers to chain this vulnerability with other vulnerabilities or misconfigurations to escalate privileges, further endangering the environment.
CISA Reported
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace
The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Affected Version(s)
SMA100 9.0.0.10-28sv and earlier
SMA100 10.2.0.7-34sv and earlier
SMA100 10.2.1.0-17sv and earlier
References
EPSS Score
26% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- ๐พ
Exploit known to exist
- ๐ฆ
CISA Reported
Vulnerability published
Vulnerability Reserved