SB2025050813 - Multiple vulnerabilities in SonicWall SMA100 SSL-VPN



SB2025050813 - Multiple vulnerabilities in SonicWall SMA100 SSL-VPN

Published: May 8, 2025

Security Bulletin ID SB2025050813
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Files or Directories Accessible to External Parties (CVE-ID: CVE-2025-32819)

The vulnerability allows a remote user to delete arbitrary files on the system.

The vulnerability exists due to improper input validation of the file path. A remote authenticated user with SSLVPN user privileges can bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.


2) Path traversal (CVE-ID: CVE-2025-32820)

The vulnerability allows a remote user to overwrite arbitrary files.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote authenticated SSLVPN user can inject a path traversal sequence to make any directory on the SMA appliance writable.


3) Improper Neutralization of Argument Delimiters in a Command (CVE-ID: CVE-2025-32821)

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to improper validation of arguments passed to shell commands. A remote authenticated SSLVPN user with admin privileges can upload arbitrary file to the appliance and escalate privileges on the system.


Remediation

Install update from vendor's website.