CVE-2021-20026 is a vulnerability in SonicWall Network Security Manager
Published on May 27, 2021
A vulnerability in the SonicWall NSM On-Prem product allows an authenticated attacker to perform OS command injection using a crafted HTTP request. This vulnerability affects NSM On-Prem 2.2.0-R10 and earlier versions.
Weakness Type
What is a Shell injection Vulnerability?
The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
CVE-2021-20026 has been classified to as a Shell injection vulnerability or weakness.
Products Associated with CVE-2021-20026
Want to know whenever a new CVE is published for SonicWall Network Security Manager? stack.watch will email you.
Affected Versions
SonicWall NSM On-Prem Version NSM On-Prem 2.2.0-R10 and earlier is affected by CVE-2021-20026Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.