PT-2025-20281 · Sonicwall · Sonicwall Sma100
Ryan Emmons
·
Published
2025-05-07
·
Updated
2025-07-17
·
CVE-2025-32819
9.0
High
Base vector | Vector | AV:N/AC:L/Au:S/C:C/I:C/A:C |
**Name of the Vulnerable Software and Affected Versions:**
SonicWall SMA 100 versions 10.2.1.14-75sv and earlier
**Description:**
A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass path traversal checks and delete an arbitrary file, potentially resulting in a reboot to factory default settings. This vulnerability has been actively exploited in the wild and may have been exploited as a zero-day. Exploitation can lead to remote code execution, denial of service, and data theft.
**Recommendations:**
SonicWall SMA 100 versions prior to 10.2.1.15-81sv are vulnerable.
Upgrade to version 10.2.1.15-81sv or later to address this vulnerability.
Restrict VPN access to trusted IP addresses.
Enforce multi-factor authentication (MFA).
Segment your network.
Exploit
Fix
RCE
DoS
LPE
Files Accessible to External Parties
Weakness Enumeration
Related Identifiers
Affected Products
References · 50
- 🔥 https://old.rapid7.com/blog/post/2025/05/07/multiple-vulnerabilities-in-sonicwall-sma-100-series-2025 · Exploit
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0011 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-32819 · Security Note
- https://bdu.fstec.ru/vul/2025-05377 · Security Note
- https://twitter.com/cybercronai/status/1920655093512176062 · Twitter Post
- https://t.me/c/2230009192/23284 · Telegram Post
- https://twitter.com/dailycve/status/1924502959498351072 · Twitter Post
- https://twitter.com/moton/status/1920506688953614704 · Twitter Post
- https://twitter.com/HunterMapping/status/1945672312281346065 · Twitter Post
- https://twitter.com/transilienceai/status/1921715803289690422 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1920248419580338461 · Twitter Post
- https://twitter.com/CVEnew/status/1920246426086343030 · Twitter Post
- https://twitter.com/MarcoFigueroa/status/1921550208413884735 · Twitter Post
- https://t.me/c/2244176767/24739 · Telegram Post
- https://twitter.com/TweetThreatNews/status/1920551418106085828 · Twitter Post