Site icon TheCyberThrone

SonicWall Patches Three Flaws in SMA 100 Devices

Advertisements

SonicWall has released security patches addressing three critical vulnerabilities in its SMA 100 Secure Mobile Access (SMA) appliances, which could allow attackers to achieve remote code execution (RCE) with root privileges. These vulnerabilities have been actively exploited, prompting urgent remediation efforts.

1. Overview of the Vulnerabilities

CVE-2025-32819: Path Traversal & Arbitrary File Deletion

CVE-2025-32820: Path Traversal Leading to Writable Directories

CVE-2025-32821: Remote Command Injection

2. Affected Devices

These vulnerabilities impact the SMA 100 Series, including:

Devices Not Affected

3. Exploitation Details

Active Exploitation

Potential Attack Scenarios

4. Mitigation Strategies

A. Apply Security Updates

B. Enable Multi-Factor Authentication (MFA)

C. Restrict Access to SSL-VPN Interfaces

D. Monitor for Exploitation

5. Compliance Requirements

Federal Agencies

Under Binding Operational Directive (BOD) 22-01, Federal Civilian Executive Branch (FCEB) agencies must apply patches by May 28, 2025.

6. Conclusion

The inclusion of CVE-2025-32819, CVE-2025-32820, and CVE-2025-32821 in security advisories highlights the critical nature of these vulnerabilities. Organizations using SonicWall SMA 100 devices must prioritize patching, restrict access, and monitor for exploitation to mitigate risks.

Exit mobile version