A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.
History

Mon, 19 May 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Sonicwall
Sonicwall sma 100
Sonicwall sma 100 Firmware
Sonicwall sma 200
Sonicwall sma 200 Firmware
Sonicwall sma 210
Sonicwall sma 210 Firmware
Sonicwall sma 400
Sonicwall sma 400 Firmware
Sonicwall sma 410
Sonicwall sma 410 Firmware
Sonicwall sma 500v
Sonicwall sma 500v Firmware
CPEs cpe:2.3:h:sonicwall:sma_100:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:sma_200:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:sma_210:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:sma_400:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:sma_410:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:sma_500v:-:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sma_100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sma_200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sma_210_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sma_400_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sma_410_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sma_500v_firmware:*:*:*:*:*:*:*:*
Vendors & Products Sonicwall
Sonicwall sma 100
Sonicwall sma 100 Firmware
Sonicwall sma 200
Sonicwall sma 200 Firmware
Sonicwall sma 210
Sonicwall sma 210 Firmware
Sonicwall sma 400
Sonicwall sma 400 Firmware
Sonicwall sma 410
Sonicwall sma 410 Firmware
Sonicwall sma 500v
Sonicwall sma 500v Firmware

Mon, 12 May 2025 14:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 07 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 07 May 2025 18:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 07 May 2025 17:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.
Weaknesses CWE-552
References

cve-icon MITRE

Status: PUBLISHED

Assigner: sonicwall

Published: 2025-05-07T17:18:23.274Z

Updated: 2025-05-13T03:55:52.692Z

Reserved: 2025-04-11T08:50:31.683Z

Link: CVE-2025-32819

cve-icon Vulnrichment

Updated: 2025-05-07T17:30:23.906Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-07T18:15:42.560

Modified: 2025-05-19T15:13:46.003

Link: CVE-2025-32819

cve-icon Redhat

No data.