Overview
SonicWall Email Security contains a path traversal vulnerability that allows a post-authenticated attacker to read files on the remote host. This vulnerability has known usage in a SonicWall Email Security exploit chain along with CVE-2021-20021 and CVE-2021-20022 to achieve privilege escalation.
https://nvd.nist.gov/vuln/detail/CVE-2021-20023
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2021-20023 |
| Vendor / Product | SonicWall — SonicWall Email Security |
| NVD Published | 2021-04-20 |
| NVD Last Modified | 2025-11-12 |
| CVSS 3.1 Score | 4.9 |
| CVSS 3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
| Severity | MEDIUM |
| CWE | CWE-22 |
| CISA KEV Added | 2021-11-03 |
| CISA KEV Deadline | 2021-11-17 |
| Known Ransomware Use | ⚠️ Yes |
CVSS 3.1 Breakdown
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Required Action
CISA BOD 22-01 Deadline: 2021-11-17.
Apply updates per vendor instructions.
Timeline
| Date | Event |
|---|---|
| 2021-11-03 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2021-11-17 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2021-20023 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |