White Hat Institute

SonicWall strongly advises clients to patch critical SMA 100 flaws ASAP

sonicwall sma 100

Considering the revelation of various security vulnerabilities that might be exploited by a malicious user to take full control of an affected machine, network security provider SonicWall is encouraging users to update their SMA 100 series appliances to the current version.

SMA 200, 210, 400, 410, and 500v systems running versions 9.0.0.11–31sv and earlier, 10.2.0.8–37sv, 10.2.1.1–19sv, 10.2.1.2–24sv and prior are affected by the vulnerabilities. The security flaws were discovered and reported by security experts Jake Baines (Rapid7) and Richard Warren (NCC Group), according to the San Jose-based firm.

The following is a list of eight security flaws discovered in their remote management products:

CVE-2021–20038 is a vulnerability identified by CVE-2021–20038 (CVSS score: 9.8) — Unauthenticated stack-based buffer overflow vulnerability in the SMA100 Series.

CVE-2021–20039 is a vulnerability identified by CVE-2021–20039 (CVSS score: 7.2) — Authenticated command injection vulnerability in the SMA 100 Series as root.

CVE-2021–20040 is a vulnerability that was discovered in the year 2021. (CVSS score: 6.5) — Unauthenticated file upload path traversal vulnerability in the SMA 100 Series.

CVE-2021–20041 is a vulnerability that was discovered in the year 2021. (CVSS score: 7.5) — Unauthenticated CPU exhaustion vulnerability in the SMA 100 Series.

CVE-2021–20042 is a vulnerability that was discovered in the year 2021. (CVSS score: 6.3) — Unauthenticated “Confused Deputy” vulnerability in the SMA 100 Series.

CVE-2021–20043 is a vulnerability that was discovered in the year 2021. (CVSS score: 8.8) — Heap-based buffer overflow vulnerability in the SMA 100 Series.

CVE-2021–20044 is a vulnerability that was discovered in the year 2021. (CVSS score: 7.2) — Post-authentication remote code execution (RCE) vulnerability in the SMA 100 Series.

CVE-2021–20045 is a vulnerability that was discovered in the year 2021. (CVSS score: 9.4) — Heap-based and stack-based buffer overflow vulnerabilities in the SMA 100 Series.

An adversary who successfully exploits the vulnerabilities could launch arbitrary code, upload specially designed payloads, edit or delete files contained in certain folders, remotely restart the system, circumvent firewall restrictions, and even exhaust all of the device’s CPU, potentially resulting in a denial-of-service (DoS) crisis.

Although there is no indication that these flaws are being leveraged in the field, it is highly suggested that users apply the fixes as soon as possible, given that SonicWall appliances have become a lucrative target for threat actors in recent months, resulting in a flurry of unwanted acts.