CVE DATABASE / CVE-2021-20016
CVE-2021-20016
SonicWall SSLVPN SMA100 SQL Injection Vulnerability
CVSS 9.8 · CRITICAL
⚠ CISA KEV — ACTIVELY EXPLOITED
RANSOMWARE
On the CISA KEV catalog
Confirmed exploited in the wild. Added 2021-11-03.
Federal remediation due 2021-11-17.
Required action: Apply updates per vendor instructions.
Summary
A SQL-Injection vulnerability in the SonicWall SSLVPN SMA100 product allows a remote unauthenticated attacker to perform SQL query to access username password and other session related information. This vulnerability impacts SMA100 build version 10.x.
CVSS 3.1 breakdown
| Base score | 9.8 (CRITICAL) |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| Attack vector | NETWORK |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity | HIGH |
| Availability | HIGH |
Weakness type (CWE)
Affected products
Sonicwall sma 100 firmwareSonicwall sma 100Sonicwall sma 200 firmwareSonicwall sma 200Sonicwall sma 210 firmwareSonicwall sma 210Sonicwall sma 400 firmwareSonicwall sma 400Sonicwall sma 410 firmwareSonicwall sma 410Sonicwall sma 500v
Check this CVE live
Use our free CVE Lookup tool for the latest NVD record, or browse the full CISA KEV catalog.
References
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0001
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-20016
Data: NIST NVD + CISA KEV. NVD last modified 2025-10-31. Always verify against the vendor advisory before acting.