A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges can inject a path traversal sequence to make any directory on the SMA appliance writable.
2025-05-07T18:15:42.737
2025-05-19T15:12:48.930
Analyzed
CVSSv3.1: 8.8 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | sonicwall | sma_100_firmware | < 10.2.1.15-81sv | Yes |
Hardware | sonicwall | sma_100 | - | No |
Operating System | sonicwall | sma_200_firmware | < 10.2.1.15-81sv | Yes |
Hardware | sonicwall | sma_200 | - | No |
Operating System | sonicwall | sma_210_firmware | < 10.2.1.15-81sv | Yes |
Hardware | sonicwall | sma_210 | - | No |
Operating System | sonicwall | sma_400_firmware | < 10.2.1.15-81sv | Yes |
Hardware | sonicwall | sma_400 | - | No |
Operating System | sonicwall | sma_410_firmware | < 10.2.1.15-81sv | Yes |
Hardware | sonicwall | sma_410 | - | No |
Operating System | sonicwall | sma_500v_firmware | < 10.2.1.15-81sv | Yes |
Hardware | sonicwall | sma_500v | - | No |