- Description
- A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.
- Source
- PSIRT@sonicwall.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- PSIRT@sonicwall.com
- CWE-552
- Hype score
- Not currently trending
Critical vulnerabilities in Cisco and SonicWall: patch ASAP Both have disclosed critical vulnerabilities in their products that could allow attackers to gain full control over devices. SonicWall :(CVE-2025-32819, -32820, -32821) https://t.co/j3m3KgUBU9 via @kaspersky 1/2
@upgradeoptions
16 May 2025
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall has released patches for three new vulnerabilities in its SMA 100 Secure Mobile Access appliances, which can be chained together to achieve remote code execution (RCE) with root privileges. The flaws are: -CVE-2025-32819 (CVSS 8.8): Allows file deletion and potential ht
@smart_c_intel
15 May 2025
52 Impressions
0 Retweets
3 Likes
0 Bookmarks
1 Reply
0 Quotes
SonicWall has released patches to address three security flaws affecting SMA 100 Secure Mobile Access (SMA) appliances that could be fashioned to result in remote code. CVE-2025-32819 may have already been exploited in the wild as a zero-day. https://t.co/qMfuABJ9rA
@xecmac_tech
13 May 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical vulnerabilities in Cisco and SonicWall: patch ASAP Both have disclosed critical vulnerabilities in their products that could allow attackers to gain full control over devices. SonicWall :(CVE-2025-32819, -32820, -32821) https://t.co/j3m3KgV9JH via @kaspersky 1/2
@upgradeoptions
13 May 2025
18 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️Vulnerabilidades en los productos SonicWall ❗CVE-2025-32819 ❗CVE-2025-32820 ❗CVE-2025-32821 ➡️Más info: https://t.co/FT9dGtNU8B https://t.co/IRo7XHKe8t
@CERTpy
12 May 2025
211 Impressions
1 Retweet
1 Like
1 Bookmark
0 Replies
0 Quotes
💠SonicWall devices face new attacks, 3critical SMA 100 flaws now exploited (CVE-2025-32819/-20/-21). 14 CVEs hit since 2021, 8 linked to ransomware. 🔑Fixes 🛡️32819:Command injection→ update firmware 🛡️32820: File write→update firmware 🛡️32821: Privileg
@Samuel257196756
12 May 2025
399 Impressions
4 Retweets
4 Likes
1 Bookmark
0 Replies
0 Quotes
Top 5 Trending CVEs: 1 - CVE-2025-37752 2 - CVE-2025-0995 3 - CVE-2025-1550 4 - CVE-2025-24203 5 - CVE-2025-32819 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
12 May 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-32819
@transilienceai
11 May 2025
32 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🚨 Just read about CVE-2025-32819, a critical vulnerability affecting SonicWall devices. I asked ChatGPT to do the research and generate a working exploit using a one shot jailbreak prompt and it delivered the script in this screenshot in under 20 seconds. This isn’t just ab
@MarcoFigueroa
11 May 2025
850 Impressions
4 Retweets
12 Likes
2 Bookmarks
3 Replies
1 Quote
#SonicWall patched three SMA 100 vulnerabilities (CVE-2025-32819, CVE-2025-32820, and CVE-2025-32821), that could be chained by a #hacker to execute arbitrary code. #Cybersecurity #infosec https://t.co/iAe4zoW6ls https://t.co/rTF2viwO5J
@twelvesec
11 May 2025
45 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-32819
@transilienceai
10 May 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
SonicWall has urged customers to patch three vulnerabilities (CVE-2025-32819, CVE-2025-32820, CVE-2025-32821) in its Secure Mobile Access (SMA) appliances, which can be exploited for remote code execution. https://t.co/Yyz5TluUgP
@securityRSS
9 May 2025
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWallのSMA100シリーズでユーザ権限を持つ攻撃者が機器をデフォルト状態に戻し管理者権限でログインできる脆弱性CVE-2025-32819がゼロデイとして観測。グローバルで7600台、日本国内で518台を発見しました。最
@nekono_naha
9 May 2025
1374 Impressions
4 Retweets
14 Likes
2 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-32819 🔴 HIGH (8.8) 🏢 SonicWall - SMA100 🏗️ 10.2.1.14-75sv and earlier versions 🔗 https://t.co/WWEOVoSL3M #CyberCron #VulnAlert #InfoSec https://t.co/OT3nNhYrvB
@cybercronai
9 May 2025
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall has released patches to address three security flaws affecting SMA 100 Secure Mobile Access (SMA) appliances that could be fashioned to result in remote code. CVE-2025-32819 may have already been exploited in the wild as a zero-day. https://t.co/HqbetVW3sH https://t.co/
@riskigy
9 May 2025
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall SMA 100 series patched 3 critical zero-day flaws! CVE-2025-32819 allows file deletion & factory resets, exploited in the wild, bypassing patches. CVE-2025-32820 enables remote privilege escalation. Stay updated! 🚨 #Security #Updates https://t.co/ex8tedOmra
@TweetThreatNews
8 May 2025
67 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
SonicWall patches 3 critical flaws in SMA 100 devices, risking remote code execution and root access. CVE-2025-32819 & CVE-2025-32820 allow bypasses and file deletion. Stay alert! 🔒 #SMA #SecurityAlert #USA https://t.co/qCapODthxU
@TweetThreatNews
8 May 2025
71 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-32819 A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentia… https://t.co/yFgl3Vg6bu
@CVEnew
7 May 2025
177 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes