SB2025012331 - Remote code execution in SonicWall SMA 1000



SB2025012331 - Remote code execution in SonicWall SMA 1000

Published: January 23, 2025 Updated: December 17, 2025

Security Bulletin ID SB2025012331
Severity
Critical
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Deserialization of untrusted data (CVE-ID: CVE-2025-23006)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC). A remote non-authenticated attacker can pass specially crafted data to the application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Note, the vulnerability is being actively exploited in the wild along with #VU120180 (CVE-2025-40602).


Remediation

Install update from vendor's website.