SonicWall Security Shocker: Old Bug Exploited Anew, Network Defenders on High Alert!

Cybersecurity company Arctic Wolf reports that the SonicWall Secure Mobile Access vulnerability, CVE-2021-20035, has been actively exploited since January 2025. This flaw, thought to be dormant, is now causing a bigger stir than a cat at a dog show, allowing attackers to inject arbitrary commands. SonicWall has increased the severity score.

Pro Dashboard

Hot Take:

Who knew that a four-year-old security flaw could come back with such a vengeance? Apparently, SonicWall’s CVE-2021-20035 decided it was time to upgrade its status from “meh” to “sizzling” on the CVSS scale. It’s like finding out your high school crush is now a movie star—unfortunately, this one is starring in a horror film called “Remote Code Execution: The Return.” Talk about a plot twist!

Key Points:

  • SonicWall’s CVE-2021-20035 vulnerability affects SMA 200, 210, 400, 410, and 500v devices.
  • Originally patched for denial-of-service, now upgraded to remote code execution severity.
  • Exploitation allows remote threat actors to execute arbitrary code with low complexity.
  • Active exploitation began as early as January 2025, utilizing default admin passwords.
  • CISA mandates federal agencies to patch by May 7th to fend off ongoing attacks.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?