Path Traversal Vulnerability in SMA100 by SonicWall
CVE-2025-32819

8.8HIGH

Key Information:

Vendor

Sonicwall

Status
Vendor
CVE Published:
7 May 2025

Badges

📈 Score: 379👾 Exploit Exists📰 News Worthy

What is CVE-2025-32819?

CVE-2025-32819 is a significant vulnerability identified in the SMA100, a secure remote access product developed by SonicWall. This vulnerability allows a remote authenticated attacker with SSLVPN user privileges to exploit the system by bypassing essential path traversal checks. Consequently, it could enable the attacker to delete arbitrary files, which in turn may lead to the device reverting to its factory default settings. Such an outcome poses severe risks to organizations, as it could disrupt operations, expose sensitive configurations, and necessitate costly recovery efforts.

Technical Details

CVE-2025-32819 specifically arises due to improper validation of file paths within the SMA100's software. This flaw can be exploited by individuals who have been granted SSLVPN access, allowing them to manipulate file system paths. By doing so, they can delete significant files without the authorization usually required to perform such actions. The vulnerability highlights critical weaknesses in access controls and file handling protocols within the product.

Potential Impact of CVE-2025-32819

  1. Operational Disruption: The ability to delete essential files can lead to system failures or disruptions, forcing organizations to undergo a lengthy recovery process and impacting overall productivity.

  2. Loss of Configuration Data: If attackers can reset the device to factory settings, organizations risk losing vital configurations that are integral to their operational integrity. This may lead to security weaknesses being inadvertently reintroduced.

  3. Enhanced Risk of Further Exploitation: A compromised SMA100 device may become a target for subsequent attacks, potentially allowing threat actors to leverage the situation for additional exploits, including data breaches or lateral movement within the network.

Affected Version(s)

SMA100 Linux 10.2.1.14-75sv and earlier versions

News Articles

Week in review: The impact of a CVE-free future on cyber defense, Patch Tuesday forecast - Help Net Security

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: What a future without CVEs means for cyber defense For

5 days ago

SonicWall Issues Patch for Exploit Chain in SMA Devices

Three vulnerabilities in SMA 100 gateways could facilitate root RCE attacks, and one of the vulnerabilities has already been exploited in the wild.

6 days ago

SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

SonicWall fixes 3 critical SMA 100 flaws enabling root-level remote code execution via SSL-VPN access.

6 days ago

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by Help Net Security

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-32819 : Path Traversal Vulnerability in SMA100 by SonicWall