sonicwall sma-500v CVE-2021-20035 is a vulnerability in SonicWall Sma 500v
Published on September 27, 2021

Improper neutralization of special elements in the SMA100 management interface allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user which potentially leads to DoS.

Vendor Advisory Vendor Advisory NVD

Known Exploited Vulnerability

This SonicWall SMA100 Appliances OS Command Injection Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. SonicWall SMA100 appliances contain an OS command injection vulnerability in the management interface that allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user, which could potentially lead to code execution.

The following remediation steps are recommended / required by May 7, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Vulnerability Analysis

CVE-2021-20035 can be exploited with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 2.8 out of four. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.

What is a Shell injection Vulnerability?

The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

CVE-2021-20035 has been classified to as a Shell injection vulnerability or weakness.


Products Associated with CVE-2021-20035

You can be notified by stack.watch whenever vulnerabilities like CVE-2021-20035 are published in these products:

 

What versions of Sma 500v are vulnerable to CVE-2021-20035?

Each of the following must match for the vulnerability to exist.

Each of the following must match for the vulnerability to exist.

Each of the following must match for the vulnerability to exist.

Each of the following must match for the vulnerability to exist.