Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Posted on May 8, 2025May 8, 2025 By CWS

Might 08, 2025Ravie LakshmananNetwork Safety / Vulnerability
SonicWall has launched patches to handle three safety flaws affecting SMA 100 Safe Cellular Entry (SMA) home equipment that may very well be usual to end in distant code execution.
The vulnerabilities are listed under –

CVE-2025-32819 (CVSS rating: 8.8) – A vulnerability in SMA100 permits a distant authenticated attacker with SSL-VPN consumer privileges to bypass the trail traversal checks and delete an arbitrary file probably leading to a reboot to manufacturing unit default settings.
CVE-2025-32820 (CVSS rating: 8.3) – A vulnerability in SMA100 permits a distant authenticated attacker with SSL-VPN consumer privileges can inject a path traversal sequence to make any listing on the SMA equipment writable
CVE-2025-32821 (CVSS rating: 6.7) – A vulnerability in SMA100 permits a distant authenticated attacker with SSL-VPN admin privileges can with admin privileges can inject shell command arguments to add a file on the equipment

“An attacker with entry to an SMA SSL-VPN consumer account can chain these vulnerabilities to make a delicate system listing writable, elevate their privileges to SMA administrator, and write an executable file to a system listing,” Rapid7 mentioned in a report. “This chain leads to root-level distant code execution.”

CVE-2025-32819 is assessed to be a patch bypass for a beforehand recognized flaw reported by NCC Group in December 2021.
The cybersecurity firm famous that CVE-2025-32819 could have been exploited within the wild as a zero-day based mostly on identified indicators of compromise (IoCs) and incident response investigations. Nevertheless, it is price noting that SonicWall makes no point out of the flaw being weaponized in real-world assaults.
The shortcomings, that impression SMA 100 Collection together with SMA 200, 210, 400, 410, 500v, have been addressed in model 10.2.1.15-81sv.
The event comes as a number of safety flaws in SMA 100 Collection units have come underneath energetic exploitation in latest weeks, together with CVE-2021-20035, CVE-2023-44221, and CVE-2024-38475. Customers are suggested to replace their cases to the newest model for optimum safety.

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Allowing, Attackers, Code, Devices, Flaws, Patches, Root, Run, SMA, SonicWall

Post navigation

Previous Post: Europol Announces More DDoS Service Takedowns, Arrests
Next Post: Valarian Bags $20M Seed Capital for ‘Isolation-First’ Infrastructure Tech

Related Posts

JPCERT Confirms Active Command Injection Attacks on Array AG Gateways JPCERT Confirms Active Command Injection Attacks on Array AG Gateways The Hacker News
Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide The Hacker News
Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps The Hacker News
Critical Metro4Shell Vulnerability Exploited in React Native Critical Metro4Shell Vulnerability Exploited in React Native The Hacker News
Why Organizations Are Abandoning Static Secrets for Managed Identities Why Organizations Are Abandoning Static Secrets for Managed Identities The Hacker News
Feds Seize .4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News