SonicWall has issued patches for three security vulnerabilities in SMA 100 Secure Mobile Access appliances that could lead to remote code execution. These flaws could allow attackers with user or admin privileges to hijack systems, potentially gaining root-level access.
Keypoints :
- SonicWall released updates addressing three critical vulnerabilities in SMA 100 appliances, impacting models like SMA 200, 210, 400, 410, and 500v.
- The vulnerabilities include CVE-2025-32819 (score: 8.8), which allows bypassing path traversal checks and deleting arbitrary files, risking device reboot.
- CVE-2025-32820 (score: 8.3) enables an attacker to inject path traversal sequences, making any directory writable on the device.
- CVE-2025-32821 (score: 6.7) permits attackers with admin privileges to inject shell commands to upload files.
- An attacker with SSL-VPN user rights could chain these flaws to elevate privileges and execute remote code at root level.
- The flaw CVE-2025-32819 is a patch bypass of a previously known issue and may have been exploited as a zero-day in the wild.
- Users are advised to upgrade to version 10.2.1.15-81sv to mitigate the risks, especially given the active exploitation of similar vulnerabilities.
Read More: https://thehackernews.com/2025/05/sonicwall-patches-3-flaws-in-sma-100.html