CVE-2025-32820Path Traversal in Sma100

CWE-22Path Traversal5 documents5 sources
Severity
8.8HIGHNVD
EPSS
1.0%
top 22.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 7
Latest updateOct 6

Description

A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges can inject a path traversal sequence to make any directory on the SMA appliance writable.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages7 packages

NVDsonicwall/sma_100_firmware< 10.2.1.15-81sv
CVEListV5sonicwall/sma10010.2.1.14-75sv and earlier versions
NVDsonicwall/sma_200_firmware< 10.2.1.15-81sv
NVDsonicwall/sma_210_firmware< 10.2.1.15-81sv
NVDsonicwall/sma_400_firmware< 10.2.1.15-81sv

🔴Vulnerability Details

2
GHSA
GHSA-hjrw-9jmp-vr8q: A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges can inject a path traversal sequence to make any director2025-05-07
CVEList
CVE-2025-32820: A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges can inject a path traversal sequence to make any director2025-05-07

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS SonicWall SMA Authenticated Arbitrary File Write via NxPostConnectionScriptFileResource (CVE-2025-32820)2025-10-06

🕵️Threat Intelligence

1
Bleepingcomputer
SonicWall urges admins to patch VPN flaw exploited in attacks2025-05-08
CVE-2025-32820 — Path Traversal in Sonicwall Sma100 | cvebase