Versio.io

CVE-2021-20048

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 10-01-2022 03:10
Last modified: - 19-01-2022 02:49
Total changes: - 2

Description

A Stack-based buffer overflow in the SonicOS SessionID HTTP response header allows a remote authenticated attacker to cause Denial of Service (DoS) and potentially results in code execution in the firewall. This vulnerability affected SonicOS Gen 5, Gen 6 and Gen 7 firmware versions.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Low
Attack complexity
Network
Attack vector
High
Availability
High
Confidentiality
High
Integrity
Low
Privileges required
Unchanged
Scope
None
User interaction
8.8
Base score
2.8
5.9
Exploitability score
Impact score
 

Verification logic

OR
AND
OR
vendor=sonicwall AND product=sonicos AND versionEndIncluding=7.0.1-r1456
OR
vendor=sonicwall AND product=nsa_2650 AND version=-
vendor=sonicwall AND product=nsa_2700 AND version=-
vendor=sonicwall AND product=nsa_3650 AND version=-
vendor=sonicwall AND product=nsa_3700 AND version=-
vendor=sonicwall AND product=nsa_4650 AND version=-
vendor=sonicwall AND product=nsa_4700 AND version=-
vendor=sonicwall AND product=nsa_5650 AND version=-
vendor=sonicwall AND product=nsa_6650 AND version=-
vendor=sonicwall AND product=nsa_6700 AND version=-
vendor=sonicwall AND product=nsa_9250 AND version=-
vendor=sonicwall AND product=nsa_9450 AND version=-
vendor=sonicwall AND product=nsa_9650 AND version=-
vendor=sonicwall AND product=tz270 AND version=-
vendor=sonicwall AND product=tz270w AND version=-
vendor=sonicwall AND product=tz300 AND version=-
vendor=sonicwall AND product=tz300p AND version=-
vendor=sonicwall AND product=tz300w AND version=-
vendor=sonicwall AND product=tz350 AND version=-
vendor=sonicwall AND product=tz350w AND version=-
vendor=sonicwall AND product=tz370 AND version=-
vendor=sonicwall AND product=tz370w AND version=-
vendor=sonicwall AND product=tz400 AND version=-
vendor=sonicwall AND product=tz400w AND version=-
vendor=sonicwall AND product=tz470 AND version=-
vendor=sonicwall AND product=tz470w AND version=-
vendor=sonicwall AND product=tz500 AND version=-
vendor=sonicwall AND product=tz500w AND version=-
vendor=sonicwall AND product=tz570 AND version=-
vendor=sonicwall AND product=tz570p AND version=-
vendor=sonicwall AND product=tz570w AND version=-
vendor=sonicwall AND product=tz600 AND version=-
vendor=sonicwall AND product=tz600p AND version=-
vendor=sonicwall AND product=tz670 AND version=-
AND
OR
vendor=sonicwall AND product=sonicos AND versionEndIncluding=7.0.1-5023-1349
OR
vendor=sonicwall AND product=nsv_10 AND version=-
vendor=sonicwall AND product=nsv_100 AND version=-
vendor=sonicwall AND product=nsv_1600 AND version=-
vendor=sonicwall AND product=nsv_200 AND version=-
vendor=sonicwall AND product=nsv_25 AND version=-
vendor=sonicwall AND product=nsv_270 AND version=-
vendor=sonicwall AND product=nsv_300 AND version=-
vendor=sonicwall AND product=nsv_400 AND version=-
vendor=sonicwall AND product=nsv_470 AND version=-
vendor=sonicwall AND product=nsv_50 AND version=-
vendor=sonicwall AND product=nsv_800 AND version=-
vendor=sonicwall AND product=nsv_870 AND version=-
AND
OR
vendor=sonicwall AND product=sonicos AND versionEndIncluding=7.0.1-5018-r1715
OR
vendor=sonicwall AND product=nssp_12400 AND version=-
vendor=sonicwall AND product=nssp_12800 AND version=-
vendor=sonicwall AND product=nssp_13700 AND version=-
vendor=sonicwall AND product=nssp_15700 AND version=-
AND
OR
vendor=sonicwall AND product=sonicos AND versionEndIncluding=6.5.4.8
OR
vendor=sonicwall AND product=nsa_2650 AND version=-
vendor=sonicwall AND product=nsa_2700 AND version=-
vendor=sonicwall AND product=nsa_3650 AND version=-
vendor=sonicwall AND product=nsa_3700 AND version=-
vendor=sonicwall AND product=nsa_4650 AND version=-
vendor=sonicwall AND product=nsa_4700 AND version=-
vendor=sonicwall AND product=nsa_5650 AND version=-
vendor=sonicwall AND product=nsa_6650 AND version=-
vendor=sonicwall AND product=nsa_6700 AND version=-
vendor=sonicwall AND product=nsa_9250 AND version=-
vendor=sonicwall AND product=nsa_9450 AND version=-
vendor=sonicwall AND product=nsa_9650 AND version=-
vendor=sonicwall AND product=soho_250w AND version=-
vendor=sonicwall AND product=supermassive_9200 AND version=-
vendor=sonicwall AND product=supermassive_9400 AND version=-
vendor=sonicwall AND product=supermassive_9600 AND version=-
vendor=sonicwall AND product=supermassive_9800 AND version=-
vendor=sonicwall AND product=tz270 AND version=-
vendor=sonicwall AND product=tz270w AND version=-
vendor=sonicwall AND product=tz300 AND version=-
vendor=sonicwall AND product=tz300p AND version=-
vendor=sonicwall AND product=tz300w AND version=-
vendor=sonicwall AND product=tz350 AND version=-
vendor=sonicwall AND product=tz350w AND version=-
vendor=sonicwall AND product=tz370 AND version=-
vendor=sonicwall AND product=tz370w AND version=-
vendor=sonicwall AND product=tz400 AND version=-
vendor=sonicwall AND product=tz400w AND version=-
vendor=sonicwall AND product=tz470 AND version=-
vendor=sonicwall AND product=tz470w AND version=-
vendor=sonicwall AND product=tz500 AND version=-
vendor=sonicwall AND product=tz500w AND version=-
vendor=sonicwall AND product=tz570 AND version=-
vendor=sonicwall AND product=tz570p AND version=-
vendor=sonicwall AND product=tz570w AND version=-
vendor=sonicwall AND product=tz600 AND version=-
vendor=sonicwall AND product=tz600p AND version=-
vendor=sonicwall AND product=tz670 AND version=-
AND
OR
vendor=sonicwall AND product=sonicos AND versionEndIncluding=6.5.1.13-1n
OR
vendor=sonicwall AND product=nssp_12400 AND version=-
vendor=sonicwall AND product=nssp_12800 AND version=-
vendor=sonicwall AND product=supermassive_9800 AND version=-
AND
OR
vendor=sonicwall AND product=sonicos AND versionEndIncluding=6.0.5.3-94o
OR
vendor=sonicwall AND product=supermassive_e10200 AND version=-
vendor=sonicwall AND product=supermassive_e10400 AND version=-
vendor=sonicwall AND product=supermassive_e10800 AND version=-
AND
OR
vendor=sonicwall AND product=sonicos AND versionEndIncluding=5.9.1.13
OR
vendor=sonicwall AND product=nsa_2650 AND version=-
vendor=sonicwall AND product=nsa_2700 AND version=-
vendor=sonicwall AND product=nsa_3650 AND version=-
vendor=sonicwall AND product=nsa_3700 AND version=-
vendor=sonicwall AND product=nsa_4650 AND version=-
vendor=sonicwall AND product=nsa_4700 AND version=-
vendor=sonicwall AND product=nsa_5650 AND version=-
vendor=sonicwall AND product=nsa_6650 AND version=-
vendor=sonicwall AND product=nsa_6700 AND version=-
vendor=sonicwall AND product=nsa_9250 AND version=-
vendor=sonicwall AND product=nsa_9450 AND version=-
vendor=sonicwall AND product=nsa_9650 AND version=-
vendor=sonicwall AND product=soho_250 AND version=-
vendor=sonicwall AND product=soho_250w AND version=-
vendor=sonicwall AND product=tz270 AND version=-
vendor=sonicwall AND product=tz270w AND version=-
vendor=sonicwall AND product=tz300 AND version=-
vendor=sonicwall AND product=tz300p AND version=-
vendor=sonicwall AND product=tz300w AND version=-
vendor=sonicwall AND product=tz350 AND version=-
vendor=sonicwall AND product=tz350w AND version=-
vendor=sonicwall AND product=tz370 AND version=-
vendor=sonicwall AND product=tz370w AND version=-
vendor=sonicwall AND product=tz400 AND version=-
vendor=sonicwall AND product=tz400w AND version=-
vendor=sonicwall AND product=tz470 AND version=-
vendor=sonicwall AND product=tz470w AND version=-
vendor=sonicwall AND product=tz500 AND version=-
vendor=sonicwall AND product=tz500w AND version=-
 

Reference

 


Keywords

NVD

 

CVE-2021-20048

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.