A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/jbaines-r7/badblood | Exploit Third Party Advisory | 
| https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0026 | Vendor Advisory | 
| https://www.rapid7.com/blog/post/2022/01/11/cve-2021-20038-42-sonicwall-sma-100-multiple-vulnerabilities-fixed-2/ | Exploit Third Party Advisory | 
| https://github.com/jbaines-r7/badblood | Exploit Third Party Advisory | 
| https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0026 | Vendor Advisory | 
| https://www.rapid7.com/blog/post/2022/01/11/cve-2021-20038-42-sonicwall-sma-100-multiple-vulnerabilities-fixed-2/ | Exploit Third Party Advisory | 
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-20038 | US Government Resource | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
Configuration 2 (hide)
| AND | 
            
            
 
  | 
    
Configuration 3 (hide)
| AND | 
            
            
 
  | 
    
Configuration 4 (hide)
| AND | 
            
            
 
  | 
    
Configuration 5 (hide)
| AND | 
            
            
 
  | 
    
History
                    31 Oct 2025, 17:13
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-20038 - US Government Resource | 
22 Oct 2025, 00:17
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
21 Oct 2025, 20:18
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
    
21 Oct 2025, 19:18
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
21 Nov 2024, 05:45
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/jbaines-r7/badblood - Exploit, Third Party Advisory | |
| References | () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0026 - Vendor Advisory | |
| References | () https://www.rapid7.com/blog/post/2022/01/11/cve-2021-20038-42-sonicwall-sma-100-multiple-vulnerabilities-fixed-2/ - Exploit, Third Party Advisory | 
13 May 2022, 14:54
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (MISC) https://github.com/jbaines-r7/badblood - Exploit, Third Party Advisory | |
| References | (MISC) https://www.rapid7.com/blog/post/2022/01/11/cve-2021-20038-42-sonicwall-sma-100-multiple-vulnerabilities-fixed-2/ - Exploit, Third Party Advisory | 
29 Apr 2022, 12:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
10 Dec 2021, 13:20
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : 7.5
         v3 : 9.8  | 
| References | (CONFIRM) https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0026 - Vendor Advisory | |
| CWE | CWE-787 | |
| CPE | cpe:2.3:o:sonicwall:sma_210_firmware:10.2.1.1-19sv:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_410_firmware:10.2.1.2-24sv:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_400_firmware:10.2.1.2-24sv:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_500v_firmware:10.2.0.8-37sv:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_210_firmware:10.2.0.8-37sv:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_500v_firmware:10.2.1.1-19sv:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_210_firmware:10.2.1.2-24sv:*:*:*:*:*:*:* cpe:2.3:h:sonicwall:sma_200:-:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_410_firmware:10.2.0.8-37sv:*:*:*:*:*:*:* cpe:2.3:h:sonicwall:sma_210:-:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_200_firmware:10.2.1.1-19sv:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_200_firmware:10.2.1.2-24sv:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_400_firmware:10.2.0.8-37sv:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_410_firmware:10.2.1.1-19sv:*:*:*:*:*:*:* cpe:2.3:h:sonicwall:sma_410:-:*:*:*:*:*:*:* cpe:2.3:h:sonicwall:sma_500v:-:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_400_firmware:10.2.1.1-19sv:*:*:*:*:*:*:* cpe:2.3:h:sonicwall:sma_400:-:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_500v_firmware:10.2.1.2-24sv:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_200_firmware:10.2.0.8-37sv:*:*:*:*:*:*:*  | 
08 Dec 2021, 10:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2021-12-08 10:15
Updated : 2025-10-31 17:13
NVD link : CVE-2021-20038
Mitre link : CVE-2021-20038
CVE.ORG link : CVE-2021-20038
JSON object : View
Products Affected
                sonicwall
- sma_210_firmware
 - sma_200
 - sma_500v_firmware
 - sma_200_firmware
 - sma_400
 - sma_410_firmware
 - sma_410
 - sma_400_firmware
 - sma_500v
 - sma_210
 
