CVE-2021-20048

CVSS V2 Medium 6.5 CVSS V3 High 8.8
Description
A Stack-based buffer overflow in the SonicOS SessionID HTTP response header allows a remote authenticated attacker to cause Denial of Service (DoS) and potentially results in code execution in the firewall. This vulnerability affected SonicOS Gen 5, Gen 6 and Gen 7 firmware versions.
Overview
  • CVE ID
  • CVE-2021-20048
  • Assigner
  • PSIRT@sonicwall.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-01-10T14:10:16
  • Last Modified Date
  • 2022-01-19T13:49:53
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:* 1 OR 7.0.1-r1456
cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_9250:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_9450:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_9650:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz300:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz300p:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz300w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz350:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz350w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz400:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz400w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz500:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz500w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz600:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz600p:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:* 1 OR 7.0.1-5023-1349
cpe:2.3:h:sonicwall:nsv_10:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsv_100:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsv_1600:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsv_200:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsv_25:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsv_270:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsv_300:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsv_400:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsv_470:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsv_50:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsv_800:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsv_870:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:* 1 OR 7.0.1-5018-r1715
cpe:2.3:h:sonicwall:nssp_12400:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nssp_12800:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:* 1 OR 6.5.4.8
cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_9250:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_9450:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_9650:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:supermassive_9200:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:supermassive_9400:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:supermassive_9600:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:supermassive_9800:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz300:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz300p:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz300w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz350:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz350w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz400:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz400w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz500:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz500w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz600:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz600p:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:* 1 OR 6.5.1.13-1n
cpe:2.3:h:sonicwall:nssp_12400:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nssp_12800:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:supermassive_9800:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:* 1 OR 6.0.5.3-94o
cpe:2.3:h:sonicwall:supermassive_e10200:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:supermassive_e10400:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:supermassive_e10800:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:* 1 OR 5.9.1.13
cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_9250:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_9450:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:nsa_9650:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz300:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz300p:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz300w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz350:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz350w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz400:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz400w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz500:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:sonicwall:tz500w:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:S/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • SINGLE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 6.5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • LOW
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 8.8
  • Base Severity
  • HIGH
  • Exploitability Score
  • 2.8
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0028 Vendor Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 06:37:06 Added to TrackCVE
2022-12-06 05:51:04 2022-01-10T14:10Z 2022-01-10T14:10:16 CVE Published Date updated
2022-12-06 05:51:04 2022-01-19T13:49:53 CVE Modified Date updated
2022-12-06 05:51:04 Analyzed Vulnerability Status updated