Virtual Event: Threat Detection & Incident Response Summit - Watch Now
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance

The vulnerabilities could be exploited to cause a denial-of-service (DoS) condition, execute arbitrary code, or access arbitrary files and directories.

SonicWall vulnerability

SonicWall this week rolled out fixes for high-severity vulnerabilities that can allow attackers to crash firewalls or execute arbitrary files on Email Security appliances.

Over 30 SonicWall Gen7 and Gen8 firewalls are affected by a stack-based buffer overflow bug in the SonicOS SSL VPN service that could be exploited remotely, without authentication, to cause a denial-of-service (DoS) condition leading to device crashes.

Tracked as CVE-2025-40601 (CVSS score of 7.2), the issue affects only firewalls that have the SonicOS SSLVPN interface or service enabled.

The weakness was resolved with the release of SonicOS versions 7.3.1-7013 and 8.0.2-8011. SonicWall Gen6 firewalls and the SMA 1000 and SMA 100 series appliances are not affected.

Until they can apply the newly released fixes, customers are advised to limit SonicOS SSL VPN access to trusted source IP addresses, and disable access from untrusted sources.

SonicWall’s Email Security appliances received fixes for two security defects, including a high-severity flaw that allows attackers to modify system files and gain arbitrary code execution.

Advertisement. Scroll to continue reading.

The first vulnerability, tracked as CVE-2025-40604 (CVSS score of 7.2), exists because the appliances do not verify the signature of loaded root filesystem images.

The second bug, CVE-2025-40605 (CVSS score of 4.9), is described as a path traversal issue that can be exploited to manipulate file system paths.

An attacker can trigger the flaw “by injecting crafted directory-traversal sequences (such as ../) and may access files and directories outside the intended restricted path”, SonicWall explains.

SonicWall addressed the security defect in Email Security 5000, 5050, 7000, 7050, 9000, VMWare, and Hyper-V appliances with version 10.0.34.8215.

The company says it is not aware of any of these vulnerabilities being exploited in the wild. Additional information can be found on SonicWall’s security advisories page.

Related: SolarWinds Patches Three Critical Serv-U Vulnerabilities

Related: Chrome 142 Update Patches Exploited Zero-Day

Related: State-Sponsored Hackers Stole SonicWall Cloud Backups in Recent Attack

Related: SonicWall SSL VPN Accounts in Attacker Crosshairs

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing for the latest cybersecurity threats, trends, and expert insights.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

People on the Move

Joe Chen has become Chief Technology Officer at Trellix.

Usercentrics has named Pawan Hegde as COO and Elena Ignatova as CPTO.

SecureAuth has named Mark van Oppen as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.