Cybersecurity specialists report the detection of a severe vulnerability in SonicOS, the operating system with which the most important developments of the technological firm SonicWall work.
Tracked as CVE-2021-20031, this flaw exists due to insufficient validation of input provided by users when processing HTTP headers. This could be leveraged by unauthenticated remote threat actors to send a specially crafted HTTP response with an arbitrary host header value and redirect firewall management users to arbitrary web domains.
Successful exploitation of this flaw would allow threat actors to perform phishing attacks, so it was assigned a score of 3.8/10 according to the Common Vulnerability Scoring System (CVSS).
According to the report, the flaw lies in the following SonicOS versions: 5.9, 188.8.131.52, 184.108.40.206-5n, 220.127.116.11-7n, 6.0, 18.104.22.168-94o, 6.5, 22.214.171.124, 126.96.36.199-1n, 188.8.131.52-3n, 184.108.40.206-44v-21-955, 220.127.116.11, 18.104.22.168-83n, 6.5.4.v-21s-987, 6.5.4.v_21s-1288, 7.0, 7.0.0-R713, 7.0.0-R906, 22.214.171.1246, 7.0.1-R579, 7.0.1-R1036, 7.0.1-R1262, 7.0.1-R1282 and 7.0.1-R1283.
While the flaw can be exploited by unauthenticated remote threat actors, cybersecurity experts have not detected active exploitation attempts or the existence of a malware variant associated with the attack. SonicWall has already issued a security patch, so users of affected deployments are encouraged to upgrade as soon as possible.
To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.