SB2025050813 - Multiple vulnerabilities in SonicWall SMA100 SSL-VPN
Published: May 8, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Files or Directories Accessible to External Parties (CVE-ID: CVE-2025-32819)
The vulnerability allows a remote user to delete arbitrary files on the system.
The vulnerability exists due to improper input validation of the file path. A remote authenticated user with SSLVPN user privileges can bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.
2) Path traversal (CVE-ID: CVE-2025-32820)
The vulnerability allows a remote user to overwrite arbitrary files.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote authenticated SSLVPN user can inject a path traversal sequence to make any directory on the SMA appliance writable.
3) Improper Neutralization of Argument Delimiters in a Command (CVE-ID: CVE-2025-32821)
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to improper validation of arguments passed to shell commands. A remote authenticated SSLVPN user with admin privileges can upload arbitrary file to the appliance and escalate privileges on the system.
Remediation
Install update from vendor's website.