A buffer overflow vulnerability in SonicOS could allow a remote attacker to cause a Denial of Service (DoS) by sending a specially crafted request to the firewall’s web interface. This vulnerability affects SonicOS Gen5, Gen6, Gen7 platforms, and SonicOSv virtual firewalls.
This advisory specifically applies to the following SonicWall products:
Platforms |
SonicOS Running Version |
TZ, NS a (GEN7) |
7.0.1-R1262 and older |
NS v (Virtual GEN7) |
7.0.1-R1219 and older |
NS sp (GEN7) |
7.0.1-R514 and older |
NS a, TZ, SOHO W, SuperMassive 92xx/94xx/96xx (GEN6+) |
6.5.4.7 and older |
NS sp 12K, SuperMassive 9800 |
6.5.1.12 and older |
SuperMassive 10K |
6.0.5.3-94o and older |
NS v (Virtual: VMWare/Hyper-V/AWS/Azure/KVM) |
All versions (virtual) |
NSA, TZ, SOHO (GEN5) |
5.9.1.13 and older |
CVE-2021-20027
Buffer overflow vulnerability
Not known to be exploited in the wild yet
CVSS Score of 7.5/10 (High)
The vulnerability requires Web Management to be enabled on the WAN/LAN interface and for there to be an ongoing active management session. This scenario can exist 1) if an administrator is logged into the web interface or 2) if Global Management System (GMS) / Network Security Manager (NSM) are configured to manage the firewall over HTTPS on the WAN interface.
If WAN management is disabled on the firewall the GMS/NSM management modes listed below are not impacted:
The SSL-VPN portal on the firewall, Virtual Office, is NOT affected.
Ingalls strongly recommends that affected clients apply the SonicOS Firmware updates ASAP. If this is not possible, Ingalls recommends following SonicWall’s recommendation that administrators limit SonicOS management access to trusted sources (and/or disable management access from untrusted internet sources) by modifying the existing SonicOS Management access rules (SSH/HTTPS/HTTP Management). This will only allow management access from trusted source IP addresses.
Updating SonicOS Firmware (Recommended)
FIXED SOFTWARE:
Platforms: NSa, TZ, NSsp (GEN7) |
|
SonicOS Running Version |
SonicOS Patch Release (Update to version or later) |
NSa,TZ- 7.0.1-R1262 and older |
7.0.1-R1456 |
NSsp- 7.0.1-R514 and older |
7.0.1-R579 |
Platforms: NSv (Virtual: GEN7) |
|
SonicOS Running Version |
SonicOS Patch Release (Update to version or later) |
7.0.1-R1219 and older |
7.0.1-R1282/1283 |
Platforms: NSa, TZ, SOHO W, SuperMassive 92xx/94xx/96xx (GEN6+) |
|
SonicOS Running Version |
SonicOS Patch Release (Update to version or later) |
6.5.4.7 and older |
6.5.4.8-89n |
Platforms: NSsp 12K, SuperMassive 9800 |
|
SonicOS Running Version |
SonicOS Patch Release (Update to version or later) |
6.5.1.12-1n and older |
6.5.1.12-3n |
Platforms: SuperMassive 10k |
|
SonicOS Running Version |
SonicOS Patch Release (Update to version or later) |
6.0.5.3-94o and older |
Pending Release |
Platforms: NSv (Virtual: VMWare/Hyper-V/AWS/Azure/KVM) |
|
SonicOS Running Version |
SonicOS Patch Release (Update to version or later) |
All versions (virtual) |
6.5.4.v_21s-1288 |
Platforms: NSA, TZ, SOHO (GEN5): |
|
SonicOS Running Version |
SonicOS Patch Release (Update to version or later) |
5.9.1.13 and older |
Pending Release |