CVE-2021-20044OS Command Injection in Sma100

Severity
8.8HIGHNVD
EPSS
5.7%
top 9.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 8
Latest updateApr 17

Description

A post-authentication remote command injection vulnerability in SonicWall SMA100 allows a remote authenticated attacker to execute OS system commands in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages6 packages

CVEListV5sonicwall/sonicwall_sma10010.2.0.8-37sv and earlier, 10.2.1.1-19sv and earlier, 10.2.1.2-24sv and earlier+2
NVDsonicwall/sma_500v_firmware10.2.0.8-37sv, 10.2.1.1-19sv+1
NVDsonicwall/sma_200_firmware10.2.0.8-37sv, 10.2.1.1-19sv+1
NVDsonicwall/sma_210_firmware10.2.0.8-37sv, 10.2.1.1-19sv+1
NVDsonicwall/sma_400_firmware10.2.0.8-37sv, 10.2.1.1-19sv+1

🔴Vulnerability Details

3
OSV
zsh vulnerabilities2022-03-14
GHSA
GHSA-fhm6-4vjw-5xgx: A post-authentication remote command injection vulnerability in SonicWall SMA100 allows a remote authenticated attacker to execute OS system commands2021-12-09
CVEList
CVE-2021-20044: A post-authentication remote command injection vulnerability in SonicWall SMA100 allows a remote authenticated attacker to execute OS system commands2021-12-08

🔍Detection Rules

1
Suricata
ET WEB_SERVER SonicWall SMA Post-Auth Python Management API Remote Code Execution (CVE-2021-20044)2025-04-17
CVE-2021-20044 — OS Command Injection in Sma100 | cvebase