8.8

CVE-2025-32820

Medienbericht

A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges can inject a path traversal sequence to make any directory on the SMA appliance writable.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SonicwallSma 100 Firmware Version < 10.2.1.15-81sv
   SonicwallSma 100 Version-
SonicwallSma 200 Firmware Version < 10.2.1.15-81sv
   SonicwallSma 200 Version-
SonicwallSma 210 Firmware Version < 10.2.1.15-81sv
   SonicwallSma 210 Version-
SonicwallSma 400 Firmware Version < 10.2.1.15-81sv
   SonicwallSma 400 Version-
SonicwallSma 410 Firmware Version < 10.2.1.15-81sv
   SonicwallSma 410 Version-
SonicwallSma 500v Firmware Version < 10.2.1.15-81sv
   SonicwallSma 500v Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.57% 0.676
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 8.3 2.8 5.5
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.