Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

2 min read

Buffer overflow vulnerability in SonicWall products (CVE-2021-20027)

A buffer overflow vulnerability in SonicOS could allow a remote attacker to cause a Denial of Service (DoS) by sending a specially crafted request to the firewall’s web interface. This vulnerability affects SonicOS Gen5, Gen6, Gen7 platforms, and SonicOSv virtual firewalls.

  • SonicWall PSIRT is not aware of any active exploitation of this vulnerability in the wild
  • No reports of a PoC have been made public at the time of this advisory


Affected Software / System

This advisory specifically applies to the following SonicWall products:

Platforms

SonicOS Running Version

TZ, NS a (GEN7)

7.0.1-R1262 and older

NS v (Virtual GEN7)

7.0.1-R1219 and older

NS sp (GEN7)

7.0.1-R514 and older

NS a, TZ, SOHO W, SuperMassive 92xx/94xx/96xx (GEN6+)

6.5.4.7 and older

NS sp 12K, SuperMassive 9800

6.5.1.12 and older

SuperMassive 10K

6.0.5.3-94o and older

NS v (Virtual: VMWare/Hyper-V/AWS/Azure/KVM)

All versions (virtual)

NSA, TZ, SOHO (GEN5)

5.9.1.13 and older

 

CVE

CVE-2021-20027


Type

Buffer overflow vulnerability


Exploit Status: 

Not known to be exploited in the wild yet


Rating

CVSS Score of 7.5/10 (High)


Impact

The vulnerability requires Web Management to be enabled on the WAN/LAN interface and for there to be an ongoing active management session. This scenario can exist 1) if an administrator is logged into the web interface or 2) if Global Management System (GMS) / Network Security Manager (NSM) are configured to manage the firewall over HTTPS on the WAN interface.

If WAN management is disabled on the firewall the GMS/NSM management modes listed below are not impacted:

  • GMS IPSec tunnel mode
  • GMS Existing VPN tunnel mode
  • GMS Zero Touch
  • NSM Zero Touch
  • GMS Management (Zero Touch Mode)
  • NSM Management (Zero Touch Mode)

 

The SSL-VPN portal on the firewall, Virtual Office, is NOT affected.


Mitigation

Ingalls strongly recommends that affected clients apply the SonicOS Firmware updates ASAP. If this is not possible, Ingalls recommends following SonicWall’s recommendation that administrators limit SonicOS management access to trusted sources (and/or disable management access from untrusted internet sources) by modifying the existing SonicOS Management access rules (SSH/HTTPS/HTTP Management). This will only allow management access from trusted source IP addresses.


Ingalls recommends the following actions:

Updating SonicOS Firmware (Recommended)

FIXED SOFTWARE:

Platforms: NSa, TZ, NSsp (GEN7) 

SonicOS Running Version 

SonicOS Patch Release (Update to version or later) 

NSa,TZ- 7.0.1-R1262 and older 

7.0.1-R1456 

NSsp- 7.0.1-R514 and older 

7.0.1-R579 

   

Platforms: NSv (Virtual: GEN7) 

SonicOS Running Version 

SonicOS Patch Release (Update to version or later) 

7.0.1-R1219 and older 

7.0.1-R1282/1283 

 

Platforms: NSa, TZ, SOHO W, SuperMassive 92xx/94xx/96xx (GEN6+) 

SonicOS Running Version 

SonicOS Patch Release (Update to version or later) 

6.5.4.7 and older 

6.5.4.8-89n 

 

Platforms: NSsp 12K, SuperMassive 9800 

SonicOS Running Version 

SonicOS Patch Release (Update to version or later) 

6.5.1.12-1n and older 

6.5.1.12-3n

 

Platforms: SuperMassive 10k 

SonicOS Running Version 

SonicOS Patch Release (Update to version or later) 

6.0.5.3-94o and older 

Pending Release 

 

Platforms: NSv (Virtual: VMWare/Hyper-V/AWS/Azure/KVM) 

SonicOS Running Version 

SonicOS Patch Release (Update to version or later) 

All versions (virtual) 

6.5.4.v_21s-1288 

 

Platforms: NSA, TZ, SOHO (GEN5):

SonicOS Running Version 

SonicOS Patch Release (Update to version or later) 

5.9.1.13 and older 

Pending Release

Vulnerability Found in Microsoft Exchange Server

Vulnerability Found in Microsoft Exchange Server

A remote code execution vulnerability exists in Microsoft Exchange Server when the server fails to properly create unique keys at install time. ...

Read More
Cybersecurity Advisory: Critical Unauthenticated Remote Code Execution Vulnerability in FortiOS

Cybersecurity Advisory: Critical Unauthenticated Remote Code Execution Vulnerability in FortiOS

This security advisory notice addresses the critical unauthenticated remote code execution vulnerability in FortisOS: CVE-2022-42475. Read on to...

Read More
Vulnerability in Windows Domain Name System (DNS)

Vulnerability in Windows Domain Name System (DNS)

On July 14, 2020, Microsoft released a security update for the issue described in CVE-2020-1350 | Windows DNS Server Remote Code Execution...

Read More