Emergency Security Bulletin: SonicWall SMA 100 Series Authenticated Arbitrary File Upload Vulnerability

https://www.redlegg.com/hubfs/Theme-2024/overlay-red.png featured image

By: RedLegg's Cyber Threat Intelligence Team

About:

RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide additional value to our customers. These emergency bulletins describe vulnerabilities or threats we classify as the highest severity level and warrant out-of-band emergency patching or mitigation action.


VULNERABILITIES

SonicWall SMA 100 Series Authenticated Arbitrary File Upload Vulnerability

 

CVSS Score: 9.1 (Critical)
Identifier: CVE‑2025‑40599
Exploit or POC: No confirmed public exploit
Update CVE‑2025‑40599 – SonicWall Security Advisory SNWLID‑2025‑0014

Description: CVE‑2025‑40599 is a critical vulnerability affecting SonicWall Secure Mobile Access (SMA) 100 Series appliances, specifically SMA 210, 410, and 500v running firmware versions 10.2.1.15‑81sv or earlier. The flaw is an authenticated arbitrary file upload issue in the SMA web management interface, permitting an administrative user to upload arbitrary files to the system. This can lead to remote code execution when combined with other actions or backdoor deployment.

 
Organizations should note that Google's Threat Intelligence Group has identified ongoing Overstep malware campaigns by threat actor UNC6148 targeting SMA 100 devices, even those updated, and using compromised credentials or potentially zero-day access. The campaign has persisted for six months and indicates possible pre-patch credential theft or additional exploitation vectors. Despite lack of confirmed exploitation via this CVE, the risk environment is considered severe.

 

Mitigation Recommendation

  • Immediately update SMA 100 Series appliances to firmware version 10.2.2.1‑90sv or later. This is the only release known to address CVE‑2025‑40599.
  • For virtual appliances (SMA 500v), rebuild from clean VM images: export configs, delete the old VM and disks, deploy a fresh SMA image, and reapply configurations.
  • Rotate all administrator passwords and reinitialize One-Time Password (OTP) bindings, even after patching.
  • Disable remote management on external‑facing interfaces (e.g. X1) where not needed.
  • Enforce Multi‑Factor Authentication (MFA) for all administrator and user access.
  • Enable Web Application Firewall (WAF) on appliance management interfaces.