Command Injection Vulnerability in SMA100 Management Interface by SonicWall
CVE-2021-20035

6.5MEDIUM

Key Information:

Vendor
Sonicwall
Status
Vendor
CVE Published:
27 September 2021

Badges

๐Ÿ“ˆ Score: 885๐Ÿ‘พ Exploit Exists๐ŸŸฃ EPSS 26%๐Ÿฆ… CISA Reported

What is CVE-2021-20035?

CVE-2021-20035 is a command injection vulnerability found in the SMA100 management interface developed by SonicWall. This product primarily serves as a secure access gateway, providing services such as remote access and secure connectivity for organizations. The vulnerability allows an authenticated remote attacker to execute arbitrary commands with the privileges of a 'nobody' user. This could have significant negative repercussions for organizations, as it opens avenues for unauthorized actions that can compromise system integrity and availability.

Technical Details

CVE-2021-20035 arises from improper neutralization of special elements within the SMA100 management interface. The flaw enables attackers who have obtained valid credentials to inject malicious commands. Given that the execution occurs under the permissions of a low-privileged user, the impact can be manipulated for various malicious intents, such as disrupting services or gaining elevated access indirectly.

Potential impact of CVE-2021-20035

  1. Denial of Service (DoS): The vulnerability can lead to service disruptions, preventing authorized users from accessing the management interface and related services, thereby crippling operations.

  2. System Integrity Compromise: Malicious commands executed via the vulnerability can alter system configurations or corrupt data, leading to unauthorized modifications that could affect compliance and operational stability.

  3. Escalation of Privileges: Although the immediate impact is limited to a 'nobody' user, successful exploitation may allow attackers to chain this vulnerability with other vulnerabilities or misconfigurations to escalate privileges, further endangering the environment.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace

The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

SMA100 9.0.0.10-28sv and earlier

SMA100 10.2.0.7-34sv and earlier

SMA100 10.2.1.0-17sv and earlier

References

EPSS Score

26% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • ๐Ÿ‘พ

    Exploit known to exist

  • ๐Ÿฆ…

    CISA Reported

  • Vulnerability published

  • Vulnerability Reserved

.