SonicWall SMA100 Appliances OS Command Injection Vulnerability (CVE-2021-20035)
SonicWall SMA100 appliances contain an OS command injection vulnerability in the management interface that allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user, which could potentially lead to code execution.
A remote attacker, with a low-privilege account, can achieve partial data exposure, complete denial of service or system unavailability. Federal agencies are required to remediate by 2025-05-07 under CISA BOD 22-01.
This is a OS Command Injection (CWE-78) vulnerability in SonicWall SMA100 Appliances. Improper neutralization of special elements in the SMA100 management interface allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user which potentially leads to DoS. Exploitation requires remote network access, low attack complexity, a low-privilege authenticated account, and no user interaction required.
Probably yes if any of these apply:
CISA added this CVE to the Known Exploited Vulnerabilities catalog on 2025-04-16 based on evidence of active exploitation in the wild. Federal agencies required to remediate by 2025-05-07.
Manual remediation steps
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.