Description
An unauthenticated and remote adversary can consume all of the device's CPU due to crafted HTTP requests sent to SMA100 /fileshare/sonicfiles/sonicfiles resulting in a loop with unreachable exit condition. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.
References (1)
Core 1
Core References
Vendor Advisory x_refsource_confirm
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0026
Scores
CVSS v3
7.5
EPSS
0.0081
EPSS Percentile
74.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-835
Status
published
Products (15)
sonicwall/sma_200_firmware
9.0.0.11-31sv
sonicwall/sma_200_firmware
10.2.0.8-37sv
sonicwall/sma_200_firmware
10.2.1.1-19sv
sonicwall/sma_210_firmware
9.0.0.11-31sv
sonicwall/sma_210_firmware
10.2.0.8-37sv
sonicwall/sma_210_firmware
10.2.1.1-19sv
sonicwall/sma_400_firmware
9.0.0.11-31sv
sonicwall/sma_400_firmware
10.2.0.8-37sv
sonicwall/sma_400_firmware
10.2.1.1-19sv
sonicwall/sma_410_firmware
9.0.0.11-31sv
... and 5 more
Published
Dec 08, 2021
Tracked Since
Feb 18, 2026