sonicwall sma_200_firmware 特权管理不恰当

CVE编号

CVE-2021-20034

利用情况

暂无

补丁情况

N/A

披露时间

2021-09-28
漏洞描述
An improper access control vulnerability in SMA100 allows a remote unauthenticated attacker to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 sonicwall sma_500v * Up to
(including)
9.0.0.10-28sv
运行在以下环境
应用 sonicwall sma_500v * From
(including)
10.2.0.0
Up to
(including)
10.2.0.7-34sv
运行在以下环境
应用 sonicwall sma_500v * From
(including)
10.2.1.0
Up to
(including)
10.2.1.0-17sv
运行在以下环境
系统 sonicwall sma_200_firmware * Up to
(including)
9.0.0.10-28sv
运行在以下环境
系统 sonicwall sma_200_firmware * From
(including)
10.2.0.0
Up to
(including)
10.2.0.7-34sv
运行在以下环境
系统 sonicwall sma_200_firmware * From
(including)
10.2.1.0
Up to
(including)
10.2.1.0-17sv
运行在以下环境
系统 sonicwall sma_210_firmware * Up to
(including)
9.0.0.10-28sv
运行在以下环境
系统 sonicwall sma_210_firmware * From
(including)
10.2.0.0
Up to
(including)
10.2.0.7-34sv
运行在以下环境
系统 sonicwall sma_210_firmware * From
(including)
10.2.1.0
Up to
(including)
10.2.1.0-17sv
运行在以下环境
系统 sonicwall sma_400_firmware * Up to
(including)
9.0.0.10-28sv
运行在以下环境
系统 sonicwall sma_400_firmware * From
(including)
10.2.0.0
Up to
(including)
10.2.0.7-34sv
运行在以下环境
系统 sonicwall sma_400_firmware * From
(including)
10.2.1.0
Up to
(including)
10.2.1.0-17sv
运行在以下环境
系统 sonicwall sma_410_firmware * Up to
(including)
9.0.0.10-28sv
运行在以下环境
系统 sonicwall sma_410_firmware * From
(including)
10.2.0.0
Up to
(including)
10.2.0.7-34sv
运行在以下环境
系统 sonicwall sma_410_firmware * From
(including)
10.2.1.0
Up to
(including)
10.2.1.0-17sv
运行在以下环境
硬件 sonicwall sma_200 - -
运行在以下环境
硬件 sonicwall sma_210 - -
运行在以下环境
硬件 sonicwall sma_400 - -
运行在以下环境
硬件 sonicwall sma_410 - -
CVSS3评分
9.1
  • 攻击路径
    网络
  • 攻击复杂度
  • 权限要求
  • 影响范围
    未更改
  • 用户交互
  • 可用性
  • 保密性
  • 完整性
CWE-ID 漏洞类型
CWE-22 对路径名的限制不恰当(路径遍历)
CWE-269 特权管理不恰当
阿里云安全产品覆盖情况