CERT-In Vulnerability Note
CIVN-2025-0343
Multiple Vulnerabilities in SonicWall Products
Original Issue Date:November 26, 2025
Severity Rating: HIGH
Software Affected
- Email Security (ES Appliance 5000, 5050, 7000, 7050, 9000, VMWare and Hyper-V) versions 10.0.33.8195 and prior versions.
- Gen7 hardware Firewalls (TZ270, TZ270W, TZ370, TZ370W, TZ470, TZ470W, TZ570, TZ570W, TZ570P, TZ670, NSa 2700, NSa 3700, NSa 4700, NSa 5700, NSa 6700, NSsp 10700, NSsp 11700, NSsp 13700, NSsp 15700) versions 7.3.0 to 7012 and prior versions.
- Gen7 virtual Firewalls (NSV270, NSv470, NSv870 for ESX, KVM, HYPER-V, AWS, Azure) versions 7.3.0 to 7012 and prior versions
- Gen8 Firewalls (TZ80, TZ280, TZ380, TZ480, TZ580, TZ680, NSa 2800, NSa 3800, NSa 4800, NSa 5800) versions 8.0.2 to 8011 and prior versions
Overview
Multiple vulnerabilities have been reported in SonicWall products which could allow an attacker to execute arbitrary code, access sensitive information, data manipulation or cause denial of service (DoS) condition on the targeted system.
Target Audience: All end user organizations and individuals using affected SonicWall products.
Risk Assessment: High risk of unauthorized data access and manipulation, denial of service.
Impact Assessment: Potential for remote code execution, sensitive information disclosure, system instability.
Description
SonicWall offers next-generation firewalls, secure VPNs, wireless security, email protection, and real-time threat intelligence. Its products deliver malware defense, intrusion prevention, content filtering, and secure remote access, providing scalable, easy-to-manage cybersecurity for businesses.
Multiple vulnerabilities exist in the SonicWall products due to inadequate download of Code without integrity verification mechanisms, by injecting crafted directory-traversal sequences, and stack-based buffer overflow in the SonicOS SSLVPN component.
Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, access sensitive information, data manipulation or cause denial of service (DoS) condition on the targeted system.
Solution
Apply appropriate updates as mentioned in:
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0016
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0018
Vendor Information
SonicWall
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0016
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0018
References
SonicWall
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0016
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0018
CVE Name
CVE-2025-40601
CVE-2025-40604
CVE-2025-40605
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-22902657
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|