CVE-2021-20048 is a vulnerability in SonicWall Sonicos
Published on January 10, 2022
A Stack-based buffer overflow in the SonicOS SessionID HTTP response header allows a remote authenticated attacker to cause Denial of Service (DoS) and potentially results in code execution in the firewall. This vulnerability affected SonicOS Gen 5, Gen 6 and Gen 7 firmware versions.
Weakness Type
What is a Stack Overflow Vulnerability?
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
CVE-2021-20048 has been classified to as a Stack Overflow vulnerability or weakness.
Products Associated with CVE-2021-20048
Want to know whenever a new CVE is published for SonicWall Sonicos? stack.watch will email you.
Affected Versions
SonicWall SonicOS:- Version 7.0.1-R146 and earlier is affected.
- Version 7.0.1-5023-1349 and earlier is affected.
- Version 7.0.1-5018-R1715 and earlier is affected.
- Version 6.5.4.8-89n and earlier is affected.
- Version 6.5.1.13-1n and earlier is affected.
- Version 6.0.5.3-94o and earlier is affected.
- Version 6.5.4.v_21s-1288 and earlier is affected.
- Version 5.9.1.13 and earlier is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.