CVE-2021-20034
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
27/09/2021
Last modified:
08/07/2022
Description
An improper access control vulnerability in SMA100 allows a remote unauthenticated attacker to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.
Impact
Base Score 3.x
9.10
Severity 3.x
CRITICAL
Base Score 2.0
6.40
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:sonicwall:sma_200_firmware:*:*:*:*:*:*:*:* | 9.0.0.10-28sv (including) | |
| cpe:2.3:o:sonicwall:sma_200_firmware:*:*:*:*:*:*:*:* | 10.2.0.0 (including) | 10.2.0.7-34sv (including) |
| cpe:2.3:o:sonicwall:sma_200_firmware:*:*:*:*:*:*:*:* | 10.2.1.0 (including) | 10.2.1.0-17sv (including) |
| cpe:2.3:h:sonicwall:sma_200:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sonicwall:sma_210_firmware:*:*:*:*:*:*:*:* | 9.0.0.10-28sv (including) | |
| cpe:2.3:o:sonicwall:sma_210_firmware:*:*:*:*:*:*:*:* | 10.2.0.0 (including) | 10.2.0.7-34sv (including) |
| cpe:2.3:o:sonicwall:sma_210_firmware:*:*:*:*:*:*:*:* | 10.2.1.0 (including) | 10.2.1.0-17sv (including) |
| cpe:2.3:h:sonicwall:sma_210:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sonicwall:sma_400_firmware:*:*:*:*:*:*:*:* | 9.0.0.10-28sv (including) | |
| cpe:2.3:o:sonicwall:sma_400_firmware:*:*:*:*:*:*:*:* | 10.2.0.0 (including) | 10.2.0.7-34sv (including) |
| cpe:2.3:o:sonicwall:sma_400_firmware:*:*:*:*:*:*:*:* | 10.2.1.0 (including) | 10.2.1.0-17sv (including) |
| cpe:2.3:h:sonicwall:sma_400:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sonicwall:sma_410_firmware:*:*:*:*:*:*:*:* | 9.0.0.10-28sv (including) | |
| cpe:2.3:o:sonicwall:sma_410_firmware:*:*:*:*:*:*:*:* | 10.2.0.0 (including) | 10.2.0.7-34sv (including) |
| cpe:2.3:o:sonicwall:sma_410_firmware:*:*:*:*:*:*:*:* | 10.2.1.0 (including) | 10.2.1.0-17sv (including) |
To consult the complete list of CPE names with products and versions, see this page



