Original Article Text

Click to Toggle View

SonicWall urges admins to patch critical RCE flaw in SMA 100 devices. SonicWall urges customers to patch SMA 100 series appliances against a critical authenticated arbitrary file upload vulnerability that can let attackers gain remote code execution. The security flaw (tracked as CVE-2025-40599) is caused by an unrestricted file upload weakness in the devices' web management interfaces, which can allow remote threat actors with administrative privileges to upload arbitrary files to the system. "SonicWall strongly recommends that users of the SMA 100 series products (SMA 210, 410, and 500v) upgrade to the specified fixed release version to remediate this vulnerability," the company said. "This vulnerability does not affect SonicWall SSL VPN SMA1000 series products or SSL-VPN running on SonicWall firewalls." While attackers would need admin privileges for CVE-2025-40599 successful exploitation and SonicWall has yet to find evidence that this vulnerability is being actively exploited, it still warned customers to secure their devices, as SMA 100 appliances are already being targeted in attacks using compromised credentials. As Google Threat Intelligence Group (GTIG) researchers warned last week, an unknown threat actor, tracked as UNC6148, has been deploying a new rootkit malware called OVERSTEP on fully patched SonicWall SMA 100 Series devices. GTIG believes UNC6148 engages in data theft and extortion attacks, and may also deploy Abyss ransomware (also tracked as VSOCIETY). While investigating these attacks, the investigators found evidence suggesting that the threat actor had stolen the credentials for the targeted appliance in January by exploiting multiple vulnerabilities (CVE-2021-20038, CVE-2024-38475, CVE-2021-20035, CVE-2021-20039, CVE-2025-32819). SonicWall 'strongly' advised customers using SMA 100 virtual or physical appliances to check them for indicators of compromise (IoCs) from GTIG's report by checking for unauthorized access and reviewing appliance logs and connection history for suspicious activity. If they find any evidence of compromise, administrators are advised to reach out to SonicWall Support immediately for assistance. To secure their devices, users should limit remote management access on external interfaces, reset all passwords, and reinitialize OTP (One-Time Password) binding for both users and administrators. They should also enforce multi-factor authentication (MFA) and enable the Web Application Firewall (WAF). Earlier this year, SonicWall flagged other security vulnerabilities exploited in attacks targeting its Secure Mobile Access (SMA) appliances. In May, the company prompted customers to patch three security vulnerabilities (CVE-2025-32819, CVE-2025-32820, and CVE-2025-32821) that could be chained to gain remote code execution as root, one of which was tagged as exploited in attacks. One month earlier, SonicWall tagged another SMA100 flaw (CVE-2021-20035) as exploited in remote code execution attacks since at least January 2025. The Board Report Deck CISOs Actually Use CISOs know that getting board buy-in starts with a clear, strategic view of how cloud security drives business value. This free, editable board report deck helps security leaders present risk, impact, and priorities in clear business terms. Turn security updates into meaningful conversations and faster decision-making in the boardroom.

Daily Brief Summary

CYBERCRIME // Urgent Patch Advisory for SonicWall SMA 100 Due to Critical Flaw

SonicWall has issued a critical patch for the SMA 100 series appliances due to a severe authenticated arbitrary file upload vulnerability, tracked as CVE-2025-40599.

The vulnerability stems from an unrestricted file upload flaw in the web management interface, potentially allowing remote attackers with administrative access to execute arbitrary code on the system.

SMA 100 series models affected include SMA 210, 410, and 500v; however, SMA1000 series products are not impacted by this vulnerability.

SonicWall warns that although there is no current active exploitation, SMA 100 appliances have been targeted using compromised credentials in separate incidents.

An unidentified threat group, known as UNC6148, has been actively deploying OVERSTEP rootkit malware on fully patched SMA 100 units, leading to possible data theft and extortion, including the deployment of Abyss ransomware.

SonicWall recommends administrators to urgently upgrade their appliances to the latest secure version, check for signs of compromise, and implement security best practices such as limiting remote access, enforcing MFA, and enabling Web Application Firewall (WAF).

Administrators are advised to reset all passwords, reinitiate OTP bindings, and contact SonicWall Support immediately if evidence of compromise is detected.