Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Japan’s sushi legend in ‘Jiro Dreams of Sushi’ documentary turns 100

October 26, 2025

Louvre heist leaves a cultural wound — and may turn French Crown Jewels into legend

October 26, 2025

By the Numbers: Why trick-or-treaters may bag more gummy candy than chocolate this Halloween

October 25, 2025
Facebook X (Twitter) Instagram
Trending
  • Japan’s sushi legend in ‘Jiro Dreams of Sushi’ documentary turns 100
  • Louvre heist leaves a cultural wound — and may turn French Crown Jewels into legend
  • By the Numbers: Why trick-or-treaters may bag more gummy candy than chocolate this Halloween
  • Health providers turning to prescriptions to get people outside
  • Poker’s NBA-and-Mafia betting scandal echoes movies, popular culture
  • Book lovers and history buffs find solace in centuries-old athenaeums
  • Grandmothers in Colombia get the quinceañera they never had
  • Russia’s population is getting smaller and older. Putin sees it as a national security threat
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Monday, October 27
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Possible Zero-Day Patched in SonicWall SMA Appliances
Cybersecurity

Possible Zero-Day Patched in SonicWall SMA Appliances

By adminMay 8, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 100


SonicWall on Wednesday announced patches for three vulnerabilities in its Secure Mobile Access (SMA) 100 series appliances that could lead to remote code execution (RCE).

The first of the bugs, tracked as CVE-2025-32819 (CVSS score of 8.8), is an arbitrary file delete issue that can be exploited by authenticated attackers with user privileges.

An attacker could bypass the device’s path traversal checks and delete an arbitrary file, which could lead to the appliance rebooting to factory default settings, SonicWall explains in its advisory.

Rapid7, which warns that CVE-2025-32819 has been exploited as a zero-day, explains that the flaw is likely a bypass for a 2021 patch resolving an unauthenticated arbitrary file delete defect.

Using a valid low-privilege session cookie, an attacker can bypass the check added by SonicWall to resolve the initial vulnerability, to delete any file as root and escalate their privileges to administrator.

“Based on known (private) IOCs and Rapid7 incident response investigations, we believe this vulnerability may have been used in the wild,” the cybersecurity firm says.

Rapid7 has not shared any information about these attacks and SonicWall’s advisory does not mention in-the-wild exploitation.

The second issue, tracked as CVE-2025-32820 (CVSS score of 8.3), allows a remote attacker with user privileges to inject “a path traversal sequence to make any directory on the SMA appliance writable”.

Advertisement. Scroll to continue reading.

Successful exploitation of the bug could also allow an attacker to overwrite any file on the system with junk contents, as root, creating a persistent denial of service (DoS) condition, Rapid7 says.

Tracked as CVE-2025-32821 (CVSS score of 6.7), the third flaw allows a remote, authenticated attacker with user privileges to “inject shell command arguments to upload a file on the appliance”, SonicWall says.

According to Rapid7, an attacker can exploit the defect to upload the file anywhere on the system. The file is under the attacker’s control and the ‘nobody’ user can write to it.

“It’s also possible to copy existing files that the ‘nobody’ user can read, such as ‘/ etc / passwd’ or the application’s SQLite database, to the web root directory for data exfiltration,” the cybersecurity firm says.

Rapid7 warns that an attacker authenticated as an SSLVPN user can chain these security defects to “make a sensitive system directory writable, elevate their privileges to SMA administrator, and write an executable file to a system directory,” to achieve root-level RCE.

SonicWall has released software version 10.2.1.15-81sv to address the vulnerabilities in its SMA 200, SMA 210, SMA 400, SMA 410, and SMA 500v secure remote access products. Users are advised to update their appliances as soon as possible.

Related: PoC Published for Exploited SonicWall Vulnerabilities

Related: SonicWall Flags Two More Vulnerabilities as Exploited

Related: SonicWall Flags Old Vulnerability as Actively Exploited

Related: SonicWall Patches High-Severity Vulnerability in NetExtender



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply

Don't Miss
Billionaires

OpenEvidence’s Daniel Nadler $1.3 Billion Richer In Just Three Months After The AI Startup Hits $6 Billion Valuation

October 20, 2025

OpenEvidence’s Daniel NadlerMauricio Candela for Forbes OpenEvidence, which Forbes profiled in July, has been signing…

Alex Bouaziz On Deel’s Latest Fundraise And Why He’s Not Worried About Litigation

October 20, 2025

Meet The Florida Sugar Barons Worth $4 Billion And Getting Sweet Deals From Donald Trump

October 17, 2025

Why Direct Lending Is Not In A Bubble

October 16, 2025
Our Picks

Japan’s sushi legend in ‘Jiro Dreams of Sushi’ documentary turns 100

October 26, 2025

Louvre heist leaves a cultural wound — and may turn French Crown Jewels into legend

October 26, 2025

By the Numbers: Why trick-or-treaters may bag more gummy candy than chocolate this Halloween

October 25, 2025

Health providers turning to prescriptions to get people outside

October 25, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.