Article Details

Scrape Timestamp (UTC): 2025-05-08 14:02:08.070

Source: https://thehackernews.com/2025/05/sonicwall-patches-3-flaws-in-sma-100.html

Original Article Text

Click to Toggle View

SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root. SonicWall has released patches to address three security flaws affecting SMA 100 Secure Mobile Access (SMA) appliances that could be fashioned to result in remote code execution. The vulnerabilities are listed below - "An attacker with access to an SMA SSL-VPN user account can chain these vulnerabilities to make a sensitive system directory writable, elevate their privileges to SMA administrator, and write an executable file to a system directory," Rapid7 said in a report. "This chain results in root-level remote code execution." CVE-2025-32819 is assessed to be a patch bypass for a previously identified flaw reported by NCC Group in December 2021. The cybersecurity company noted that CVE-2025-32819 may have been exploited in the wild as a zero-day based on known indicators of compromise (IoCs) and incident response investigations. However, it's worth noting that SonicWall makes no mention of the flaw being weaponized in real-world attacks. The shortcomings, that impact SMA 100 Series including SMA 200, 210, 400, 410, 500v, have been addressed in version 10.2.1.15-81sv. The development comes as multiple security flaws in SMA 100 Series devices have come under active exploitation in recent weeks, including CVE-2021-20035, CVE-2023-44221, and CVE-2024-38475. Users are advised to update their instances to the latest version for optimal protection.

Daily Brief Summary

MALWARE // SonicWall Fixes Critical Vulnerabilities in SMA 100 Devices

SonicWall has issued patches for three critical vulnerabilities in the SMA 100 Series devices, enabling remote code execution.

Attackers could potentially escalate privileges to administrator level, write files, and execute them at the root level by exploiting these security flaws.

The addressed vulnerabilities could allow an attacker with SMA SSL-VPN user account access to modify system directories and elevate privileges.

One of the vulnerabilities, CVE-2025-32819, may have been exploited as a zero-day, with previous incidents suggesting active exploitation.

Previously identified vulnerabilities in the SMA 100 Series, including some from 2021 and 2023, have been actively exploited according to recent findings.

The fixes are included in the newly released firmware version 10.2.1.15-81sv, and users are urged to upgrade their devices to this latest version to ensure security against these issues.