SonicWall SMA 1000 Series <= 12.4.3-03093 / 12.5.x <= 12.5.0-02283 Local Privilege Escalation (SNWLID-2025-0019)

medium Nessus Plugin ID 279000

Synopsis

The remote device is affected by a local privilege escalation vulnerability.

Description

The remote host is a SonicWall SMA 1000 Series device that may be affected by a local privilege escalation vulnerability:

- A local privilege escalation vulnerability due to insufficient authorization in the SonicWall SMA1000 appliance management console (AMC). (CVE-2025-40602)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to SonicWall SMA 1000 Series version 12.4.3-03245 or 12.5.0-02283 or later.

See Also

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0019

Plugin Details

Severity: Medium

ID: 279000

File Name: sonicwall_sma_SNWLID-2025-0019.nasl

Version: 1.3

Type: remote

Family: CGI abuses

Published: 12/17/2025

Updated: 12/19/2025

Configuration: Enable paranoid mode, Enable thorough checks (optional)

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.0

CVSS v2

Risk Factor: High

Base Score: 7.1

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:H/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2025-40602

CVSS v3

Risk Factor: Medium

Base Score: 6.6

Temporal Score: 6.1

Vector: CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: x-cpe:/o:sonicwall:firmware

Required KB Items: Settings/ParanoidReport, installed_sw/SonicWall Secure Mobile Access

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/17/2025

Vulnerability Publication Date: 12/17/2025

CISA Known Exploited Vulnerability Due Dates: 12/24/2025

Reference Information

CVE: CVE-2025-40602

IAVA: 2025-A-0938