First published: Wed May 07 2025(Updated: )
A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SMA 100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-32819 is considered a high severity vulnerability due to the potential for unauthorized file deletion and device reset to factory defaults.
To fix CVE-2025-32819, update the SMA100 device to the latest firmware version provided by the vendor.
Users of the SMA100 device with remote authenticated SSLVPN user privileges are affected by CVE-2025-32819.
The potential impacts of CVE-2025-32819 include unauthorized file deletion and reconfiguration of the device to factory settings.
Currently, the best course of action is to apply the firmware update as there are no known effective workarounds for CVE-2025-32819.