Currently, SonicWall reports no evidence of active exploitation in the wild, though the pre-authentication nature of these flaws makes immediate patching essential for maintaining network security posture. The vulnerabilities affect SMA 210, 410, and 500v models running firmware version 10.2.1.15-81sv and earlier, exposing organizations to significant security risks. The company emphasizes that SonicWall SSL VPN SMA1000 series products and SSL-VPN functionality on SonicWall firewalls remain unaffected by these security flaws. SonicWall SMA 100 series has three vulnerabilities enabling remote code execution without authentication. The security advisory reveals three distinct vulnerabilities with varying severity levels. Both buffer overflow vulnerabilities share the same CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L, indicating network-based attacks with low complexity requirements and no authentication prerequisites. This flaw enables remote, unauthenticated attackers to cause Denial of Service (DoS) conditions or potentially execute arbitrary code on affected systems. Additionally, organizations should activate the Web Application Firewall (WAF) feature on SMA100 devices to provide additional protection layers.
This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 24 Jul 2025 10:15:14 +0000