9.8

CVE-2021-20042

Warnung

An unauthenticated remote attacker can use SMA 100 as an unintended proxy or intermediary undetectable proxy to bypass firewall rules. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SonicwallSma 200 Firmware Version9.0.0.11-31sv
   SonicwallSma 200 Version-
SonicwallSma 200 Firmware Version10.2.0.8-37sv
   SonicwallSma 200 Version-
SonicwallSma 200 Firmware Version10.2.1.1-19sv
   SonicwallSma 200 Version-
SonicwallSma 210 Firmware Version9.0.0.11-31sv
   SonicwallSma 210 Version-
SonicwallSma 210 Firmware Version10.2.0.8-37sv
   SonicwallSma 210 Version-
SonicwallSma 210 Firmware Version10.2.1.1-19sv
   SonicwallSma 210 Version-
SonicwallSma 410 Firmware Version9.0.0.11-31sv
   SonicwallSma 410 Version-
SonicwallSma 410 Firmware Version10.2.0.8-37sv
   SonicwallSma 410 Version-
SonicwallSma 410 Firmware Version10.2.1.1-19sv
   SonicwallSma 410 Version-
SonicwallSma 400 Firmware Version9.0.0.11-31sv
   SonicwallSma 400 Version-
SonicwallSma 400 Firmware Version10.2.0.8-37sv
   SonicwallSma 400 Version-
SonicwallSma 400 Firmware Version10.2.1.1-19sv
   SonicwallSma 400 Version-
SonicwallSma 500v Firmware Version9.0.0.11-31sv
   SonicwallSma 500v Version-
SonicwallSma 500v Firmware Version10.2.0.8-37sv
   SonicwallSma 500v Version-
SonicwallSma 500v Firmware Version10.2.1.1-19sv
   SonicwallSma 500v Version-
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.2% 0.783
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-441 Unintended Proxy or Intermediary ('Confused Deputy')

The product receives a request, message, or directive from an upstream component, but the product does not sufficiently preserve the original source of the request before forwarding the request to an external actor that is outside of the product's control sphere. This causes the product to appear to be the source of the request, leading it to act as a proxy or other intermediary between the upstream component and the external actor.