← Back to CVEs
CVE-2021-20049
HIGH7.5
Description
A vulnerability in SonicWall SMA100 password change API allows a remote unauthenticated attacker to perform SMA100 username enumeration based on the server responses. This vulnerability impacts 10.2.1.2-24sv, 10.2.0.8-37sv and earlier 10.x versions.
CVE Details
CVSS v3.1 Score7.5
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published12/23/2021
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
sonicwall:sma100sonicwall:sma200sonicwall:sma210sonicwall:sma400sonicwall:sma410sonicwall:sma500vsonicwall:sma_100_firmwaresonicwall:sma_200_firmwaresonicwall:sma_210_firmwaresonicwall:sma_400_firmwaresonicwall:sma_410_firmwaresonicwall:sma_500v_firmware
Weaknesses (CWE)
CWE-204CWE-203
References
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0030(PSIRT@sonicwall.com)
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0030(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.