A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions.
https://thehackernews.com/2025/02/ransomhub-becomes-2024s-top-ransomware.html
https://www.sygnia.co/blog/abyss-locker-ransomware-attack-analysis/
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-207a
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a
https://www.tenable.com/cyber-exposure/tenable-2022-threat-landscape-report
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-040a
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-117a
Published: 2021-12-08
Updated: 2025-03-14
Named Vulnerability: SonicWall SMA 100 series vulnerabilityKnown Exploited Vulnerability (KEV)
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: High
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.94311