Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32819: CWE-552 Files or Directories Accessible to External Parties in SonicWall SMA100

0
High
VulnerabilityCVE-2025-32819cvecve-2025-32819cwe-552
Published: Wed May 07 2025 (05/07/2025, 17:18:23 UTC)
Source: CVE
Vendor/Project: SonicWall
Product: SMA100

Description

A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:24:56 UTC

Technical Analysis

CVE-2025-32819 is a vulnerability identified in SonicWall SMA100 devices, specifically affecting versions 10.2.1.14-75sv and earlier. The flaw is categorized under CWE-552, which involves files or directories being accessible to external parties due to insufficient access control. In this case, a remote attacker who has authenticated SSLVPN user privileges can bypass the device's path traversal protections. This bypass allows the attacker to delete arbitrary files on the device's filesystem. The deletion of certain critical files can trigger the device to reboot and reset to factory default settings, causing loss of all custom configurations and potentially disrupting secure remote access services. The vulnerability is remotely exploitable over the network without requiring user interaction beyond authentication, and the CVSS v3.1 base score is 8.8, indicating high severity with high impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the nature of the vulnerability makes it a significant risk for organizations using SonicWall SMA100 appliances for VPN access. The vulnerability was publicly disclosed on May 7, 2025, and no patches have been linked yet, emphasizing the need for vigilance and interim mitigations.

Potential Impact

The exploitation of CVE-2025-32819 can have severe consequences for organizations. By deleting arbitrary files, an attacker can cause the SMA100 device to reboot and reset to factory defaults, resulting in the loss of all VPN configurations and security policies. This leads to immediate denial of secure remote access for users, potentially halting business operations that rely on VPN connectivity. Additionally, the attacker could manipulate or delete files to compromise confidentiality and integrity of the device's data. The disruption could affect incident response, remote workforce productivity, and access to critical internal resources. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that depend heavily on secure VPN access are particularly vulnerable. Recovery from such an attack may require manual reconfiguration and could expose the organization to further risks during downtime. The requirement for authenticated access limits the attack surface but does not eliminate the threat, especially if user credentials are compromised or insider threats exist.

Mitigation Recommendations

To mitigate CVE-2025-32819, organizations should first monitor SonicWall's official channels for patches or firmware updates addressing this vulnerability and apply them promptly once available. Until patches are released, restrict SSLVPN user privileges to the minimum necessary and enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. Implement network segmentation to limit access to the SMA100 management interfaces and VPN services only to trusted networks and users. Regularly audit VPN user accounts and remove or disable inactive or unnecessary accounts. Employ monitoring and alerting for unusual file deletion activities or device reboots that could indicate exploitation attempts. Backup SMA100 configurations frequently to enable rapid restoration in case of a reset. Consider deploying additional endpoint security controls to detect and prevent lateral movement by attackers who gain VPN access. Finally, educate users about the importance of credential security and the risks of phishing attacks that could lead to unauthorized access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
sonicwall
Date Reserved
2025-04-11T08:50:31.683Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6704

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 2/26/2026, 9:24:56 PM

Last updated: 3/28/2026, 9:16:16 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses