ID

VAR-202109-1777


CVE

CVE-2021-20034


TITLE

Pillow Buffer error vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202104-975

DESCRIPTION

An improper access control vulnerability in SMA100 allows a remote unauthenticated attacker to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Sonicwall SMA100 is a security access gateway device of American Sonicwall Company. An access control error vulnerability exists in the SonicWall SMA100 Series due to improper access restrictions in the SMA 100 management interface. SonicWall unauthenticated SMA100 arbitrary file delete vulnerability

Trust: 1.62

sources: NVD: CVE-2021-20034 // CNNVD: CNNVD-202104-975 // VULHUB: VHN-377653 // VULMON: CVE-2021-20034

AFFECTED PRODUCTS

vendor:sonicwallmodel:sma 500vscope:lteversion:10.2.1.0-17sv

Trust: 1.0

vendor:sonicwallmodel:sma 200scope:lteversion:10.2.1.0-17sv

Trust: 1.0

vendor:sonicwallmodel:sma 400scope:lteversion:10.2.1.0-17sv

Trust: 1.0

vendor:sonicwallmodel:sma 210scope:gteversion:10.2.1.0

Trust: 1.0

vendor:sonicwallmodel:sma 500vscope:gteversion:10.2.0.0

Trust: 1.0

vendor:sonicwallmodel:sma 410scope:lteversion:10.2.1.0-17sv

Trust: 1.0

vendor:sonicwallmodel:sma 210scope:lteversion:9.0.0.10-28sv

Trust: 1.0

vendor:sonicwallmodel:sma 200scope:gteversion:10.2.0.0

Trust: 1.0

vendor:sonicwallmodel:sma 500vscope:lteversion:9.0.0.10-28sv

Trust: 1.0

vendor:sonicwallmodel:sma 200scope:lteversion:9.0.0.10-28sv

Trust: 1.0

vendor:sonicwallmodel:sma 400scope:lteversion:9.0.0.10-28sv

Trust: 1.0

vendor:sonicwallmodel:sma 400scope:gteversion:10.2.1.0

Trust: 1.0

vendor:sonicwallmodel:sma 210scope:lteversion:10.2.0.7-34sv

Trust: 1.0

vendor:sonicwallmodel:sma 410scope:lteversion:9.0.0.10-28sv

Trust: 1.0

vendor:sonicwallmodel:sma 210scope:gteversion:10.2.0.0

Trust: 1.0

vendor:sonicwallmodel:sma 200scope:gteversion:10.2.1.0

Trust: 1.0

vendor:sonicwallmodel:sma 410scope:gteversion:10.2.1.0

Trust: 1.0

vendor:sonicwallmodel:sma 400scope:lteversion:10.2.0.7-34sv

Trust: 1.0

vendor:sonicwallmodel:sma 200scope:lteversion:10.2.0.7-34sv

Trust: 1.0

vendor:sonicwallmodel:sma 500vscope:lteversion:10.2.0.7-34sv

Trust: 1.0

vendor:sonicwallmodel:sma 400scope:gteversion:10.2.0.0

Trust: 1.0

vendor:sonicwallmodel:sma 410scope:lteversion:10.2.0.7-34sv

Trust: 1.0

vendor:sonicwallmodel:sma 410scope:gteversion:10.2.0.0

Trust: 1.0

vendor:sonicwallmodel:sma 500vscope:gteversion:10.2.1.0

Trust: 1.0

vendor:sonicwallmodel:sma 210scope:lteversion:10.2.1.0-17sv

Trust: 1.0

sources: NVD: CVE-2021-20034

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-20034
value: CRITICAL

Trust: 1.0

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202109-1663
value: CRITICAL

Trust: 0.6

VULHUB: VHN-377653
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-20034
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-377653
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-20034
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-377653 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202109-1663 // NVD: CVE-2021-20034

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.1

problemtype:CWE-284

Trust: 1.0

problemtype:CWE-269

Trust: 0.1

sources: VULHUB: VHN-377653 // NVD: CVE-2021-20034

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202109-1663

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202104-975

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-377653

PATCH

title:Sonicwall SMA100 Fixes for access control error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=164754

Trust: 0.6

sources: CNNVD: CNNVD-202109-1663

EXTERNAL IDS

db:NVDid:CVE-2021-20034

Trust: 1.8

db:PACKETSTORMid:164564

Trust: 1.7

db:EXPLOIT-DBid:50430

Trust: 0.7

db:CNNVDid:CNNVD-202109-1663

Trust: 0.7

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:CS-HELPid:SB2021092406

Trust: 0.6

db:VULHUBid:VHN-377653

Trust: 0.1

db:VULMONid:CVE-2021-20034

Trust: 0.1

sources: VULHUB: VHN-377653 // VULMON: CVE-2021-20034 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202109-1663 // NVD: CVE-2021-20034

REFERENCES

url:http://packetstormsecurity.com/files/164564/sonicwall-sma-10.2.1.0-17sv-password-reset.html

Trust: 2.3

url:https://psirt.global.sonicwall.com/vuln-detail/snwlid-2021-0021

Trust: 1.8

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://www.exploit-db.com/exploits/50430

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021092406

Trust: 0.6

sources: VULHUB: VHN-377653 // VULMON: CVE-2021-20034 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202109-1663 // NVD: CVE-2021-20034

SOURCES

db:VULHUBid:VHN-377653
db:VULMONid:CVE-2021-20034
db:CNNVDid:CNNVD-202104-975
db:CNNVDid:CNNVD-202109-1663
db:NVDid:CVE-2021-20034

LAST UPDATE DATE

2024-08-14T12:25:58.888000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-377653date:2022-07-08T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202109-1663date:2022-07-11T00:00:00
db:NVDid:CVE-2021-20034date:2022-07-08T18:21:10.883

SOURCES RELEASE DATE

db:VULHUBid:VHN-377653date:2021-09-27T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:CNNVDid:CNNVD-202109-1663date:2021-09-24T00:00:00
db:NVDid:CVE-2021-20034date:2021-09-27T18:15:08.327