CVE-2021-20026

A vulnerability in the SonicWall NSM On-Prem product allows an authenticated attacker to perform OS command injection using a crafted HTTP request. This vulnerability affects NSM On-Prem 2.2.0-R10 and earlier versions.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sonicwall:network_security_manager:*:*:*:*:on-premises:*:*:*
cpe:2.3:a:sonicwall:network_security_manager:2.2.0:-:*:*:on-premises:*:*:*
cpe:2.3:a:sonicwall:network_security_manager:2.2.0:r10:*:*:on-premises:*:*:*

History

08 Jun 2021, 16:36

Type Values Removed Values Added
CPE cpe:2.3:a:sonicwall:network_security_manager:2.2.0:r10:*:*:on-premises:*:*:*
cpe:2.3:a:sonicwall:network_security_manager:*:*:*:*:on-premises:*:*:*
cpe:2.3:a:sonicwall:network_security_manager:2.2.0:-:*:*:on-premises:*:*:*
References (CONFIRM) https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0014 - (CONFIRM) https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0014 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 9.0
v3 : 8.8
CWE CWE-78

27 May 2021, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-05-27 19:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-20026

Mitre link : CVE-2021-20026

CVE.ORG link : CVE-2021-20026


JSON object : View

Products Affected

sonicwall

  • network_security_manager
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')