A huge collection of 3400+ free website templates JAR theme com WP themes and more at the biggest community-driven free web design site
Home / security-advisories / SonicWall Zero-day Security Restriction Bypass Vulnerability – CVE-2021-20016

SonicWall Zero-day Security Restriction Bypass Vulnerability – CVE-2021-20016

Advisory No: TZCERT/SA/2021/02/04

Date of First Release: 04th February 2021

Source: Sonic Wall

Software Affected: 

SMA 100 10.x devices (SMA 200, SMA 210, SMA 400, SMA 410, SMA 500v)


This vulnerability is caused by improper SQL command neutralization in SonicWall SSLVPN SMA100 products that could allow unauthenticated, remote attacker exploit for credential access.


In SonicWall SSL VPN SMA 100 products, the SQL injection bug could allow an unauthenticated attacker to perform SQL query to access username, password, and other session-related information. The flaw affects both physical and virtual SMA 100 version 10.x devices.


Successful exploitation of the vulnerability could allow an unprivileged user to gain access to the system.


SonicWall has issued both workaround and security update to address the affected firmware. Users and administrators are advised to upgrade firmware to the latest stable version.


  1. Enable multifactor authentication (MFA) as a safety measure.
  2. Enable Web Application Firewall (WAF) on SMA100.
  3. Reset the passwords for any users who may have logged into the device via the web interface.


  1. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0001
  2. https://www.sonicwall.com/support/product-notification/urgent-patch-available-for-sma-100-series-10-x-firmware-zero-day-vulnerability-updated-feb-3-2-p-m-cst/210122173415410/

Check Also

Critical Vulnerability in WordPress Bricks Plug-in (CVE-2024-25600)

Advisory No: TZCERT/SA/2024/02/22 Date of First Release: 22nd February 2024 Source: WordPress plugin Bricks Builder …