The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Wednesday added a security flaw impacting SonicWall Safe Cellular Entry (SMA) 100 Sequence gateways to its Recognized Exploited Vulnerabilities (KEV) catalog, based mostly on proof of lively exploitation.
The high-severity vulnerability, tracked as CVE-2021-20035 (CVSS rating: 7.2), pertains to a case of working system command injection that might end in code execution.
“Improper neutralization of particular parts within the SMA100 administration interface permits a distant authenticated attacker to inject arbitrary instructions as a ‘no person’ person, which may probably result in code execution,” SonicWall stated in an advisory launched in September 2021.

The flaw impacts SMA 200, SMA 210, SMA 400, SMA 410, and SMA 500v (ESX, KVM, AWS, Azure) units operating the next variations –
- 10.2.1.0-17sv and earlier (Fastened in 10.2.1.1-19sv and better)
- 10.2.0.7-34sv and earlier (Fastened in 10.2.0.8-37sv and better)
- 9.0.0.10-28sv and earlier (Fastened in 9.0.0.11-31sv and better)
Whereas the precise particulars surrounding the exploitation of CVE-2021-20035 are presently unknown, SonicWall has since revised the bulletin to acknowledge that “this vulnerability is probably being exploited within the wild.”
Federal Civilian Government Department (FCEB) businesses are required to use the mandatory mitigations by Might 7, 2025, to safe their networks towards lively threats.