Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32819: CWE-552 Files or Directories Accessible to External Parties in SonicWall SMA100

0
High
VulnerabilityCVE-2025-32819cvecve-2025-32819cwe-552
Published: Wed May 07 2025 (05/07/2025, 17:18:23 UTC)
Source: CVE
Vendor/Project: SonicWall
Product: SMA100

Description

A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.

AI-Powered Analysis

AILast updated: 08/23/2025, 00:33:20 UTC

Technical Analysis

CVE-2025-32819 is a high-severity vulnerability affecting SonicWall SMA100 devices running firmware version 10.2.1.14-75sv and earlier. The vulnerability is classified under CWE-552, which involves files or directories being accessible to external parties. Specifically, this flaw allows a remote attacker who has authenticated SSLVPN user privileges to bypass path traversal protections. By exploiting this, the attacker can delete arbitrary files on the device's filesystem. The deletion of critical files can lead to severe consequences, including the device rebooting to factory default settings. This effectively results in a loss of all configurations, potentially disrupting network security and connectivity. The CVSS v3.1 score is 8.8, indicating a high impact on confidentiality, integrity, and availability. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and privileges (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the potential for complete device reset and loss of security controls. The lack of available patches at the time of publication further elevates the urgency for mitigation.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. SonicWall SMA100 devices are commonly used for secure remote access via SSLVPN, especially in enterprises and government agencies. Exploitation could allow an authenticated attacker—potentially a malicious insider or a compromised user account—to disrupt remote access infrastructure by deleting critical files and forcing the device to reset to factory defaults. This would cause immediate loss of VPN configurations, user access policies, and security settings, leading to downtime and increased exposure to external threats. In sectors such as finance, healthcare, and critical infrastructure, this could interrupt business continuity and compromise sensitive data confidentiality and integrity. Additionally, the forced reset could open a window for further attacks during recovery or reconfiguration. Given the reliance on remote work and VPNs in Europe, especially post-pandemic, the operational and reputational risks are significant.

Mitigation Recommendations

Organizations should take immediate steps to mitigate this vulnerability beyond generic patching advice. First, restrict SSLVPN user privileges strictly to necessary personnel and enforce strong authentication mechanisms, such as multi-factor authentication, to reduce the risk of compromised credentials. Monitor VPN user activities for unusual file access or deletion attempts. Implement network segmentation to isolate SMA100 devices from less trusted network zones, limiting the blast radius of a potential exploit. Regularly back up device configurations and maintain tested recovery procedures to quickly restore settings if a reset occurs. Employ intrusion detection systems (IDS) or endpoint detection and response (EDR) tools to detect anomalous behavior indicative of exploitation attempts. Until a vendor patch is available, consider deploying compensating controls such as additional access controls or temporary removal of vulnerable services if feasible. Engage with SonicWall support for updates and apply patches promptly once released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sonicwall
Date Reserved
2025-04-11T08:50:31.683Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6704

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 8/23/2025, 12:33:20 AM

Last updated: 11/22/2025, 4:45:13 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats