Vulnerabilities > Sonicwall > SMA 500V Firmware > 10.2.1.9.57sv
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2025-05-07 | CVE-2025-32819 | Unspecified vulnerability in Sonicwall products A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings. | 8.8 |
2025-05-07 | CVE-2025-32820 | Unspecified vulnerability in Sonicwall products A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges can inject a path traversal sequence to make any directory on the SMA appliance writable. | 8.8 |
2025-05-07 | CVE-2025-32821 | Unspecified vulnerability in Sonicwall products A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN admin privileges can with admin privileges can inject shell command arguments to upload a file on the appliance. | 7.2 |
2024-02-24 | CVE-2024-22395 | Unspecified vulnerability in Sonicwall products Improper access control vulnerability has been identified in the SMA100 SSL-VPN virtual office portal, which in specific conditions could potentially enable a remote authenticated attacker to associate another user's MFA mobile application. | 6.3 |
2023-12-05 | CVE-2023-44221 | OS Command Injection vulnerability in Sonicwall products Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user, potentially leading to OS Command Injection Vulnerability. | 7.2 |
2023-12-05 | CVE-2023-5970 | Improper Authentication vulnerability in Sonicwall products Improper authentication in the SMA100 SSL-VPN virtual office portal allows a remote authenticated attacker to create an identical external domain user using accent characters, resulting in an MFA bypass. | 8.8 |