A severe post-authentication vulnerability, tracked as CVE-2025-40599, has been disclosed in SonicWall’s SMA 100 Series appliances. This flaw allows an attacker with valid administrative credentials to upload arbitrary files to the system, opening the door to potential remote code execution (RCE). The vulnerability was reported collaboratively by Dawid Skomski from SonicWall PSIRT and Zander Work of the Google Threat Intelligence Group (GTIG).
The lack of adequate checks on file types and paths within the upload handler of the SMA 100 Series web interface is the root cause. The system fails to enforce strict validation on file extensions or file contents, leading to an unrestricted file upload scenario.
At present, there is no evidence of exploitation in the wild, but GTIG has issued caution based on potential abuse scenarios seen in similar vulnerabilities.
1. SonicWall strongly recommends that users of the SMA 100 series products (SMA 210, 410, and 500v) upgrade to the specified fixed release version to remediate this vulnerability.Fixed versions: 10.2.2.1-90sv and higher
2. All organizations with deployments of the SMA 100 series appliance (whether virtual or physical) must perform a thorough analysis of the system to determine if any following indicators of compromise are present:
If any signs of compromise are detected, please contact SonicWall Support immediately for assistance.
3. To mitigate this risk and restore operational integrity for virtual product SMA 500v, refer the SonicWall advisory (https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0014) for mitigation steps.
4. SonicWall recommends following additional measures for all SMA 100 Series appliance:
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn
No related posts found.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
This website uses the following additional cookies:
(List the cookies that you are using on the website here.)
More information about our Cookie Policy