SonicWall SMA Appliances Under Attack: A Comedy of Errors in Cybersecurity

SonicWall SMA appliances have been under siege since January 2025, with attackers exploiting a remote code execution flaw. Arctic Wolf researchers reveal threat actors are stealing VPN credentials, exploiting the default super admin account’s weak password. Even fully patched devices are vulnerable if password hygiene is poor. Time to tighten those passwords, folks!

Pro Dashboard

Hot Take:

The ultimate password fail: SonicWall’s SMA appliances are being exploited by attackers, not because of some super-sophisticated hack, but because people are still using “password” as a password. If only hackers had to answer a riddle instead, like “What has keys but can’t open locks?” Oh wait, that’s the SonicWall admins!

Key Points:

  • SonicWall SMA appliances have been under attack since January 2025 due to a remote code execution flaw.
  • The vulnerability, CVE-2021-20035, is an OS Command Injection Vulnerability in the SMA100 management interface.
  • Despite a patch being released in September 2021, poor password practices still allow access.
  • CISA has added this flaw to its Known Exploited Vulnerabilities catalog and demands fixes by May 7, 2025.
  • Arctic Wolf reports attackers are exploiting the default admin account with the weak password “password.”

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?