Service Notices

All Notices > Security Notices > SonicWall Analytics Remote Code Execution Vulnerability (CVE-2021-20032)

SonicWall Analytics Remote Code Execution Vulnerability (CVE-2021-20032)

Aug 18, 2021 GMT+08:00

I. Overview

SonicWall disclosed a remote code execution vulnerability (CVE-2021-20032) in SonicWall Analytics. SonicWall Analytics 2.5 On-Prem is vulnerable to the Java Debug Wire Protocol (JDWP) interface security misconfiguration vulnerability. Attackers can exploit this vulnerability to remotely execute code without authentication.

SonicWall Analytics is a powerful intelligence-driven analytic service. If you are a SonicWall Analytics user, check your system and implement timely security hardening.

Reference: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0018

II. Severity

Severity: important

(Severity: low, moderate, important, and critical)

III. Affected Products

Affected versions:

SonicWall Analytics On-Prem 2.5.2518 and earlier

Secure versions:

SonicWall Analytics on-prem 2.5.2519 and later

IV. Security Recommendations

This vulnerability has been fixed in later official versions. If your service version falls into the affected range, upgrade it to a latest secure version.

Download address: https://mysonicwall.com/muir/login

Until the below patch can be applied, SonicWall strongly recommends that administrators block access to 9000/TCP port on affected versions.

Note: Before fixing vulnerabilities, back up your files and conduct a thorough test.