CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “sonicwall”

165 vulnerabilities found for “sonicwall”

Page 1 of 9

CVE-2023-44221
HIGH7.2

Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user, potentially leading to OS Command Injection Vulnerability.

sonicwall / sma_200_firmware+4
Network
Published Dec 5, 2023
Page 1 of 9
CVE-2022-47522
HIGH7.5

The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key.

ieee / ieee_802.11+29
Adjacent
Published Apr 15, 2023
CVE-2022-2915
HIGH8.8

A Heap-based Buffer Overflow vulnerability in the SonicWall SMA100 appliance allows a remote authenticated attacker to cause Denial of Service (DoS) on the appliance or potentially lead to code execution. This vulnerability impacts 10.2.1.5-34sv and earlier versions.

sonicwall / sma_200_firmware+4
Network
Published Aug 26, 2022
CVE-2022-22277
MEDIUM5.3

A vulnerability in SonicOS SNMP service resulting exposure of Wireless Access Point sensitive information in cleartext.

sonicwall / tz300p_firmware+79
Network
Published Apr 27, 2022
CVE-2022-22278
HIGH7.5

A vulnerability in SonicOS CFS (Content filtering service) returns a large 403 forbidden HTTP response message to the source address when users try to access prohibited resource this allows an attacker to cause HTTP Denial of Service (DoS) attack

sonicwall / tz300p_firmware+48
Network
Published Apr 27, 2022
CVE-2022-22276
MEDIUM5.3

A vulnerability in SonicOS SNMP service resulting exposure of sensitive information to an unauthorized user.

sonicwall / tz300p_firmware+48
Network
Published Apr 27, 2022
CVE-2022-22273
CRITICAL9.8

Improper neutralization of Special Elements leading to OS Command Injection vulnerability impacting end-of-life Secure Remote Access (SRA) products and older firmware versions of Secure Mobile Access (SMA) 100 series products, specifically the SRA appliances running all 8.x, 9.0.0.5-19sv and earlier versions and Secure Mobile Access (SMA) 100 series products running older firmware 9.0.0.9-26sv and earlier versions

sonicwall / sma_200_firmware+8
Network
Published Mar 17, 2022
CVE-2021-20049
HIGH7.5

A vulnerability in SonicWall SMA100 password change API allows a remote unauthenticated attacker to perform SMA100 username enumeration based on the server responses. This vulnerability impacts 10.2.1.2-24sv, 10.2.0.8-37sv and earlier 10.x versions.

sonicwall / sma_100_firmware+17
Network
Published Dec 23, 2021
CVE-2021-20050
HIGH7.5

An Improper Access Control Vulnerability in the SMA100 series leads to multiple restricted management APIs being accessible without a user login, potentially exposing configuration meta-data.

sonicwall / sma_100_firmware+17
Network
Published Dec 23, 2021
CVE-2021-20041
HIGH7.5

An unauthenticated and remote adversary can consume all of the device's CPU due to crafted HTTP requests sent to SMA100 /fileshare/sonicfiles/sonicfiles resulting in a loop with unreachable exit condition. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

sonicwall / sma_200_firmware+14
Network
Published Dec 8, 2021
CVE-2021-20040
HIGH7.5

A relative path traversal vulnerability in the SMA100 upload funtion allows a remote unauthenticated attacker to upload crafted web pages or files as a 'nobody' user. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

sonicwall / sma_200_firmware+9
Network
Published Dec 8, 2021
CVE-2021-20045
CRITICAL9.8

A buffer overflow vulnerability in SMA100 sonicfiles RAC_COPY_TO (RacNumber 36) method allows a remote unauthenticated attacker to potentially execute code as the 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

sonicwall / sma_200_firmware+9
Network
Published Dec 8, 2021
CVE-2021-20038
CRITICAL9.8

A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions.

sonicwall / sma_200_firmware+14
Network
Published Dec 8, 2021
CVE-2021-20043
HIGH8.8

A Heap-based buffer overflow vulnerability in SonicWall SMA100 getBookmarks method allows a remote authenticated attacker to potentially execute code as the nobody user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

sonicwall / sma_200_firmware+9
Network
Published Dec 8, 2021
CVE-2021-20039
HIGH8.8

Improper neutralization of special elements in the SMA100 management interface '/cgi-bin/viewcert' POST http method allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

sonicwall / sma_200_firmware+14
Network
Published Dec 8, 2021
CVE-2021-20044
HIGH8.8

A post-authentication remote command injection vulnerability in SonicWall SMA100 allows a remote authenticated attacker to execute OS system commands in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

sonicwall / sma_200_firmware+9
Network
Published Dec 8, 2021
CVE-2021-20042
CRITICAL9.8

An unauthenticated remote attacker can use SMA 100 as an unintended proxy or intermediary undetectable proxy to bypass firewall rules. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

sonicwall / sma_200_firmware+14
Network
Published Dec 8, 2021
CVE-2021-20034
CRITICAL9.1

An improper access control vulnerability in SMA100 allows a remote unauthenticated attacker to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.

sonicwall / sma_200_firmware+14
Network
Published Sep 27, 2021
CVE-2021-20035
MEDIUM6.5

Improper neutralization of special elements in the SMA100 management interface allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user which potentially leads to DoS.

sonicwall / sma_200_firmware+14
Network
Published Sep 27, 2021
CVE-2021-20016
CRITICAL9.8

A SQL-Injection vulnerability in the SonicWall SSLVPN SMA100 product allows a remote unauthenticated attacker to perform SQL query to access username password and other session related information. This vulnerability impacts SMA100 build version 10.x.

sonicwall / sma_100_firmware+5
Network
Published Feb 4, 2021