SonicWall Security Shocker: Old Bug Exploited Anew, Network Defenders on High Alert!
Cybersecurity company Arctic Wolf reports that the SonicWall Secure Mobile Access vulnerability, CVE-2021-20035, has been actively exploited since January 2025. This flaw, thought to be dormant, is now causing a bigger stir than a cat at a dog show, allowing attackers to inject arbitrary commands. SonicWall has increased the severity score.

Hot Take:
Who knew that a four-year-old security flaw could come back with such a vengeance? Apparently, SonicWall’s CVE-2021-20035 decided it was time to upgrade its status from “meh” to “sizzling” on the CVSS scale. It’s like finding out your high school crush is now a movie star—unfortunately, this one is starring in a horror film called “Remote Code Execution: The Return.” Talk about a plot twist!
Key Points:
- SonicWall’s CVE-2021-20035 vulnerability affects SMA 200, 210, 400, 410, and 500v devices.
- Originally patched for denial-of-service, now upgraded to remote code execution severity.
- Exploitation allows remote threat actors to execute arbitrary code with low complexity.
- Active exploitation began as early as January 2025, utilizing default admin passwords.
- CISA mandates federal agencies to patch by May 7th to fend off ongoing attacks.
Already a member? Log in here