PT-2021-13733 · Sma100 · Sma100
Published
2021-09-24
·
Updated
2025-07-17
·
CVE-2021-20035
9.0
High
Base vector | Vector | AV:N/AC:L/Au:S/C:C/I:C/A:C |
**Name of the Vulnerable Software and Affected Versions:**
SonicWall SMA 100 series appliances
SonicWall SMA 200
SonicWall SMA 210
SonicWall SMA 400
SonicWall SMA 410
SonicWall SMA 500v
versions prior to the fixed version
**Description:**
A command injection vulnerability exists in the web management interface of SonicWall SMA appliances. This vulnerability allows a remote, authenticated attacker to inject arbitrary commands as a 'nobody' user, potentially leading to denial of service (DoS) or remote code execution (RCE). The vulnerability is due to improper neutralization of special elements within the interface. Active exploitation of this vulnerability has been observed since January 2025, with threat actors attempting to steal VPN credentials. Approximately 1000 organizations have been affected.
The `/cgi-bin/viewcert` endpoint has been observed during exploitation attempts.
**Recommendations:**
SonicWall SMA 100 series appliances: Apply the available patch or take the devices offline by May 7, 2025.
SonicWall SMA 200: Apply the available patch.
SonicWall SMA 210: Apply the available patch.
SonicWall SMA 400: Apply the available patch.
SonicWall SMA 410: Apply the available patch.
SonicWall SMA 500v: Apply the available patch.
Fix
RCE
OS Command Injection
XSS
Related Identifiers
Affected Products
References · 59
- https://nvd.nist.gov/vuln/detail/CVE-2021-20035 · Security Note
- https://bdu.fstec.ru/vul/2025-05023 · Security Note
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0022 · Security Note, Vendor Advisory
- https://twitter.com/CyberxtronTech/status/1912745074032828719 · Twitter Post
- https://twitter.com/HunterMapping/status/1945672312281346065 · Twitter Post
- https://twitter.com/TheHackersNews/status/1912744239961698435 · Twitter Post
- https://twitter.com/syedaquib77/status/1913591704462196748 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1913267433621651963 · Twitter Post
- https://twitter.com/jbhall56/status/1912844911113621680 · Twitter Post
- https://twitter.com/ScyScan/status/1913205891438166131 · Twitter Post
- https://twitter.com/syedaquib77/status/1914411782195830985 · Twitter Post
- https://t.me/c/1262650373/29520 · Telegram Post
- https://twitter.com/transilienceai/status/1913805408990576725 · Twitter Post
- https://twitter.com/syedaquib77/status/1912613939843645475 · Twitter Post
- https://twitter.com/RedTeamNewsBlog/status/1914094398628942174 · Twitter Post