SonicWall Zero-day Security Restriction Bypass Vulnerability - CVE-2021-20016

Imechapishwa: Feb 04, 2021 14:07

Advisory No:

Source:

Software Affected:

Overview

Description

Advisory No: TZCERT/SA/2021/02/04

Date of First Release: 04th February 2021

Source: Sonic Wall

Software Affected: 

SMA 100 10.x devices (SMA 200, SMA 210, SMA 400, SMA 410, SMA 500v)

Overview:

This vulnerability is caused by improper SQL command neutralization in SonicWall SSLVPN SMA100 products that could allow unauthenticated, remote attacker exploit for credential access.

Description:

In SonicWall SSL VPN SMA 100 products, the SQL injection bug could allow an unauthenticated attacker to perform SQL query to access username, password, and other session-related information. The flaw affects both physical and virtual SMA 100 version 10.x devices.

Impact:

Successful exploitation of the vulnerability could allow an unprivileged user to gain access to the system.

Solution:

SonicWall has issued both workaround and security update to address the affected firmware. Users and administrators are advised to upgrade firmware to the latest stable version.

     Workaround

  1. Enable multifactor authentication (MFA) as a safety measure.
  2. Enable Web Application Firewall (WAF) on SMA100.
  3. Reset the passwords for any users who may have logged into the device via the web interface.

References:

  1. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0001
  2. https://www.sonicwall.com/support/product-notification/urgent-patch-available-for-sma-100-series-10-x-firmware-zero-day-vulnerability-updated-feb-3-2-p-m-cst/210122173415410/

Impact

Solution

References

Subscribe To TZ - CERT Newsletter

A digest of Tanzania Computer Emergency Response Team coverage of cyber-security news across the globe.

Subscribe
Ripoti Tukio