SonicWall SMA 500v Firmware 9.0.0.11-31sv

CPE Details

SonicWall SMA 500v Firmware 9.0.0.11-31sv
9.0.0.11-31sv
2021-12-10
13h13 +00:00
2021-12-14
17h48 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:sonicwall:sma_500v_firmware:9.0.0.11-31sv:*:*:*:*:*:*:*

Informations

Vendor

sonicwall

Product

sma_500v_firmware

Version

9.0.0.11-31sv

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-22395 2024-02-23 23h37 +00:00 Improper access control vulnerability has been identified in the SMA100 SSL-VPN virtual office portal, which in specific conditions could potentially enable a remote authenticated attacker to associate another user's MFA mobile application.
6.3
Medium
CVE-2023-5970 2023-12-05 20h20 +00:00 Improper authentication in the SMA100 SSL-VPN virtual office portal allows a remote authenticated attacker to create an identical external domain user using accent characters, resulting in an MFA bypass.
8.8
High
CVE-2023-44221 2023-12-05 20h10 +00:00 Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user, potentially leading to OS Command Injection Vulnerability.
7.2
High
CVE-2022-2915 2022-08-26 18h30 +00:00 A Heap-based Buffer Overflow vulnerability in the SonicWall SMA100 appliance allows a remote authenticated attacker to cause Denial of Service (DoS) on the appliance or potentially lead to code execution. This vulnerability impacts 10.2.1.5-34sv and earlier versions.
8.8
High
CVE-2022-1703 2022-06-03 19h10 +00:00 Improper neutralization of special elements in the SonicWall SSL-VPN SMA100 series management interface allows a remote authenticated attacker to inject OS Commands which potentially leads to remote command execution vulnerability or denial of service (DoS) attack.
8.8
High
CVE-2021-20050 2021-12-23 00h20 +00:00 An Improper Access Control Vulnerability in the SMA100 series leads to multiple restricted management APIs being accessible without a user login, potentially exposing configuration meta-data.
7.5
High
CVE-2021-20049 2021-12-23 00h20 +00:00 A vulnerability in SonicWall SMA100 password change API allows a remote unauthenticated attacker to perform SMA100 username enumeration based on the server responses. This vulnerability impacts 10.2.1.2-24sv, 10.2.0.8-37sv and earlier 10.x versions.
7.5
High
CVE-2021-20042 2021-12-08 08h55 +00:00 An unauthenticated remote attacker can use SMA 100 as an unintended proxy or intermediary undetectable proxy to bypass firewall rules. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.
9.8
Critical
CVE-2021-20041 2021-12-08 08h55 +00:00 An unauthenticated and remote adversary can consume all of the device's CPU due to crafted HTTP requests sent to SMA100 /fileshare/sonicfiles/sonicfiles resulting in a loop with unreachable exit condition. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.
7.5
High
CVE-2021-20039 2021-12-08 08h55 +00:00 Improper neutralization of special elements in the SMA100 management interface '/cgi-bin/viewcert' POST http method allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.
8.8
High