{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T02:51:07.228","vulnerabilities":[{"cve":{"id":"CVE-2021-20047","sourceIdentifier":"PSIRT@sonicwall.com","published":"2021-12-08T10:15:08.247","lastModified":"2024-11-21T05:45:51.073","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SonicWall Global VPN client version 4.10.6 (32-bit and 64-bit) and earlier have a DLL Search Order Hijacking vulnerability. Successful exploitation via a local attacker could result in remote code execution in the target system."},{"lang":"es","value":"El cliente SonicWall Global VPN versión 4.10.6 (32 bits y 64 bits) y anteriores, presentan una vulnerabilidad de Secuestro de Órdenes de Búsqueda de DLL. Una explotación con éxito por medio de un atacante local podría resultar en una ejecución de código remota en el sistema objetivo"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:C/I:C/A:C","baseScore":6.9,"accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":3.4,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"PSIRT@sonicwall.com","type":"Secondary","description":[{"lang":"en","value":"CWE-427"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-427"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sonicwall:global_vpn_client:*:*:*:*:*:*:x64:*","versionEndIncluding":"4.10.6","matchCriteriaId":"6753B3C2-C77F-4CB0-BC09-DA2F6BD4AB0E"},{"vulnerable":true,"criteria":"cpe:2.3:a:sonicwall:global_vpn_client:*:*:*:*:*:*:x86:*","versionEndIncluding":"4.10.6","matchCriteriaId":"02A8917C-3DE5-48F5-B716-517B89195C1D"}]}]}],"references":[{"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0025","source":"PSIRT@sonicwall.com","tags":["Vendor Advisory"]},{"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0025","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}