SonicWall has released new firmware updates for SMA 100 Series remote access devices with fixes for multiple High risk vulnerabilities.
“SonicWall has verified and patched vulnerabilities of critical and medium severity (CVSS 5.3-9.8) in SMA 100 series appliances, which include SMA 200, 210, 400, 410 and 500v products,” SonicWall wrote in an advisory.
Moreover, SMA 100 series devices with WAF enabled are also impacted by the majority of these vulnerabilities.
As a result, the SMA 100 series firmware updates includes the following fixes:
- CVE-2021-20038: Unauthenticated Stack-based Buffer Overflow Vulnerability*
- CVE-2021-20039: Authenticated Command Injection Vulnerability as Root Vulnerability
- CVE-2021-20040: Unauthenticated File Upload Path Traversal Vulnerability
- CVE-2021-20041: Unauthenticated CPU Exhaustion Vulnerability
- CVE-2021-20042: Unauthenticated “Confused Deputy” Vulnerability
- CVE-2021-20043: getBookmarks Heap-based Buffer Overflow Vulnerability
- CVE-2021-20044: Post-Authentication Remote Code Execution (RCE) Vulnerability
- CVE-2021-20045: Multiple Unauthenticated File Explorer Heap-based and Stack-based Buffer Overflows Vulnerabilities*
* Note: Vulnerabilities CVE-2021-20038 and CVE-2021-20045 are rated High severity and CVSS score of 9.8 and 9.4 respectively.
“There is no evidence that these vulnerabilities are being exploited in the wild,” SonicWall added.
However, SonicWall urges their impacted customers implement applicable patches as soon as possible.Â
CISA also continued to warn since July “of threat actors actively targeting a known, previously patched, vulnerability in SonicWall SMA 100 series appliances.”