- Description
- Improper neutralization of special elements in the SMA100 management interface allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user which potentially leads to DoS.
- Source
- PSIRT@sonicwall.com
- NVD status
- Analyzed
- Products
- sma_200_firmware, sma_210_firmware, sma_400_firmware, sma_410_firmware, sma_500v
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:N/A:C
Data from CISA
- Vulnerability name
- SonicWall SMA100 Appliances OS Command Injection Vulnerability
- Exploit added on
- Apr 16, 2025
- Exploit action due
- May 7, 2025
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Hype score
- Not currently trending
🚨Alert🚨 : SonicWall SMA devices hacked with OVERSTEP rootkit tied to ransomware.Multiple n-day vulnerabilities (CVE-2021-20038, CVE-2024-38475, CVE-2021-20035, CVE-2021-20039, CVE-2025-32819) could have been exploited. 📊110K Services are found on the https://t.co/ysWb28B
@HunterMapping
17 Jul 2025
1264 Impressions
3 Retweets
8 Likes
3 Bookmarks
0 Replies
0 Quotes
🛡️SonicWall VPN Flaws Under Active Attack SonicWall warns SMA100 bugs CVE-2023-44221 & CVE-2024-38475 are exploited in the wild—enabling RCE & session hijacking. Patch to 10.2.1.14-75sv ASAP. CVE-2021-20035 also being hit. https://t.co/WPUJYfAETp #CyberSecurity
@dCypherIO
1 May 2025
70 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sma_200_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1CAE16B5-709A-40E9-9C49-EA5DFA685299",
"versionEndExcluding": "9.0.0.11-31sv"
},
{
"criteria": "cpe:2.3:o:sonicwall:sma_200_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2353D2AD-1943-4400-A7F9-884D38657CE4",
"versionEndExcluding": "10.2.0.8-37sv",
"versionStartIncluding": "10.2.0.0"
},
{
"criteria": "cpe:2.3:o:sonicwall:sma_200_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A53E73ED-CE3D-4E81-BA96-5160CE726A96",
"versionEndExcluding": "10.2.1.1-19sv",
"versionStartIncluding": "10.2.1.0"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:sma_200:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "0B190266-AD6F-401B-9B2E-061CDD539236"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sma_210_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "47BFDA65-A16B-4983-9F7B-0B93DE953926",
"versionEndExcluding": "9.0.0.11-31sv"
},
{
"criteria": "cpe:2.3:o:sonicwall:sma_210_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "BB4A2769-6449-4C24-8A4F-EE38A8CC32EC",
"versionEndExcluding": "10.2.0.8-37sv",
"versionStartIncluding": "10.2.0.0"
},
{
"criteria": "cpe:2.3:o:sonicwall:sma_210_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "87C8D809-A71E-4C51-9F43-69C867E5E81F",
"versionEndExcluding": "10.2.1.1-19sv",
"versionStartIncluding": "10.2.1.0"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:sma_210:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "51587338-4A5F-41FC-9497-743F061947C2"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sma_400_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B0B3EC70-4A0C-4281-80AC-1E004E1D5346",
"versionEndExcluding": "9.0.0.11-31sv"
},
{
"criteria": "cpe:2.3:o:sonicwall:sma_400_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B45BCC41-D7F1-4242-8501-0E1AC2BD81A5",
"versionEndExcluding": "10.2.0.8-37sv",
"versionStartIncluding": "10.2.0.0"
},
{
"criteria": "cpe:2.3:o:sonicwall:sma_400_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8BC841EE-6C00-402C-ACF4-CE4536EDFBCC",
"versionEndExcluding": "10.2.1.1-19sv",
"versionStartIncluding": "10.2.1.0"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:sma_400:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9D728332-10C9-4508-B720-569D44E99543"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sma_410_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "999C0747-AFF2-4ABF-B8F0-A89202C1ACF4",
"versionEndExcluding": "9.0.0.11-31sv"
},
{
"criteria": "cpe:2.3:o:sonicwall:sma_410_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A24369C9-53EE-4914-85DE-E95B8737CE8A",
"versionEndExcluding": "10.2.0.8-37sv",
"versionStartIncluding": "10.2.0.0"
},
{
"criteria": "cpe:2.3:o:sonicwall:sma_410_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "34DA5394-545B-48ED-9971-7761AEC0278F",
"versionEndExcluding": "10.2.1.1-19sv",
"versionStartIncluding": "10.2.1.0"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:sma_410:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9DFB8FBC-FFA4-4526-B306-D5692A43DC9E"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sonicwall:sma_500v:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DE6FE067-0B1A-4065-9218-7C6DD0D8A76E",
"versionEndExcluding": "9.0.0.11-31sv"
},
{
"criteria": "cpe:2.3:a:sonicwall:sma_500v:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E86E27A1-5953-48C1-ACD0-3080AF643746",
"versionEndExcluding": "10.2.0.8-37sv",
"versionStartIncluding": "10.2.0.0"
},
{
"criteria": "cpe:2.3:a:sonicwall:sma_500v:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "681CE4BD-C1F0-4737-88AE-3B555B85C33B",
"versionEndExcluding": "10.2.1.1-19sv",
"versionStartIncluding": "10.2.1.0"
}
],
"operator": "OR"
}
]
}
]