PT-2025-20281 · Sonicwall · Sonicwall Sma100

Ryan Emmons

·

Published

2025-05-07

·

Updated

2025-07-17

·

CVE-2025-32819

CVSS v2.0
9.0
VectorAV:N/AC:L/Au:S/C:C/I:C/A:C

**Name of the Vulnerable Software and Affected Versions:**

SonicWall SMA 100 versions 10.2.1.14-75sv and earlier

**Description:**

A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass path traversal checks and delete an arbitrary file, potentially resulting in a reboot to factory default settings. This vulnerability has been actively exploited in the wild and may have been exploited as a zero-day. Exploitation can lead to remote code execution, denial of service, and data theft.

**Recommendations:**

SonicWall SMA 100 versions prior to 10.2.1.15-81sv are vulnerable.

Upgrade to version 10.2.1.15-81sv or later to address this vulnerability.

Restrict VPN access to trusted IP addresses.

Enforce multi-factor authentication (MFA).

Segment your network.

Exploit

Fix

RCE

DoS

LPE

Files Accessible to External Parties

Weakness Enumeration

Related Identifiers

BDU:2025-05377
CVE-2025-32819

Affected Products

Sonicwall Sma100