#VU49936 SQL injection in SonicWall products - CVE-2021-20016

 

#VU49936 SQL injection in SonicWall products - CVE-2021-20016

Published: January 24, 2021 / Updated: February 5, 2021


Vulnerability identifier: #VU49936
Vulnerability risk: Critical
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Red
CVE-ID: CVE-2021-20016
CWE-ID: CWE-89
Exploitation vector: Remote access
Exploit availability: The vulnerability is being exploited in the wild
Vulnerable software:
SMA 100
NetExtender for Linux
NetExtender for Windows
Software vendor:
SonicWall

Description

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote non-authenticated attacker can send a specially crafted HTTP request to the SSL-VPN appliance and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to access usernames, passwords and other session related information.

Note, the vulnerability is being actively exploited in the wild.


Remediation

Install update from vendor's website.

The following products are affected:

Physical appliances – SMA 200, SMA 210, SMA 400 and SMA 410.

Virtual appliance – SMA 500v.


External links