CVE-2021-20025 vulnerability in SonicWall Products
Published on May 13, 2021
SonicWall Email Security Virtual Appliance version 10.0.9 and earlier versions contain a default username and a password that is used at initial setup. An attacker could exploit this transitional/temporary user account from the trusted domain to access the Virtual Appliance remotely only when the device is freshly installed and not connected to Mysonicwall.
Weakness Type
Use of Hard-coded Credentials
The software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
Products Associated with CVE-2021-20025
stack.watch emails you whenever new vulnerabilities are published in SonicWall Email Security Virtual Appliance or SonicWall Email Security. Just hit a watch button to start following.
Affected Versions
SonicWall Email Security Virtual Appliance Version 10.0.9 and earlier is affected by CVE-2021-20025Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.