17. April 2025
Linda Fritzler

Important notice: SonicWall warns against active exploitation of CVE-2021-20035

SonicWall was recently informed by trusted security partners that the vulnerability CVE-2021-20035 could be actively exploited. The vulnerability affects older firmware versions of the SMA 100 series and was already published in an official advisory in September 2021 - including a corresponding security update. In this blog post you will find all the relevant information - so that you can act quickly if you are affected.

⚠️ Who is affected?

Specifically, all companies that continue to use older versions of the SMA 100 firmware are affected. The vulnerability can potentially be exploited remotely, resulting in a serious security risk. In our technical article on IT security, you can find out how you can protect your systems in a targeted and effective manner.

✅ What needs to be done?

SonicWall strongly recommends that all affected customers update to the following version:

Firmware-Version: 10.2.1.14-75sv

The official security advisory can be found here: 🔗 SonicWall Advisory SNWLID-2021-0022

🔒 How to protect your network

Immediate action can help to ensure your network security. We recommend:

  • Checking the firmware currently in use
  • Immediate implementation of the recommended updates
  • Regular security checks and patch management

Do you need support with updating or checking your security measures? We would be happy to help you - just get in touch! Interested in a SonicWall project? Simply submit your request using our request form!

Also from SonicWall: How to successfully implement NIS2 for a better cyber security standard.

Service Hotline
+493915054420
Mo-Do, 09:00 - 16:30 Uhr und Fr, 09:00 - 15:00 Uhr
(zum deutschen Festnetztarif, Mobilfunkpreise richten sich nach dem jeweiligen Mobilfunkanbieter)
usercalendar-fullmagnifiercrosslistchevron-leftchevron-right