Wednesday, 09 July 2025

SonicWall patches command injection vulnerability in NSM manager

SonicWall has updated its Network Security Manager (NSM) application to address the command injection threat. The vulnerability impacts on-premises versions, but does not affect NSM SaaS versions.

The NSM program provides the user with an interface for centralized management of corporate firewalls and monitoring of all switches and access points connected to them. It also allows to automate tasks related to network security.

Vulnerability CVE-2021-20026, identified by an expert from Positive Technologies, opens up the possibility of executing any system command with root privileges. The exploit requires authentication and is carried out by sending a malicious HTTP request to the server. The threat severity was rated at 8.8 points on the CVSS scale.

The problem impacts NSM builds 2.2.0-R10-H1 and earlier releases. The patch is included in the 2.2.1-R6 update.

There is no data on the exploitation of the vulnerability by cybercriminals at the moment. Nevertheless, the developer urges owners of NSM devices to update the firmware as soon as possible.

Source: anti-malware.ru

02 June 2021

-
102