
[CIVN-2025-0343] Multiple Vulnerabilities in SonicWall Products
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in SonicWall Products
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: High
Software Affected
· Email Security (ES Appliance 5000, 5050, 7000, 7050, 9000, VMWare and Hyper-V) versions 10.0.33.8195 and prior versions.
· Gen7 hardware Firewalls (TZ270, TZ270W, TZ370, TZ370W, TZ470, TZ470W, TZ570, TZ570W, TZ570P, TZ670, NSa 2700, NSa 3700, NSa 4700, NSa 5700, NSa 6700, NSsp 10700, NSsp 11700, NSsp 13700, NSsp 15700) versions 7.3.0 to 7012 and prior versions.
· Gen7 virtual Firewalls (NSV270, NSv470, NSv870 for ESX, KVM, HYPER-V, AWS, Azure) versions 7.3.0 to 7012 and prior versions
· Gen8 Firewalls (TZ80, TZ280, TZ380, TZ480, TZ580, TZ680, NSa 2800, NSa 3800, NSa 4800, NSa 5800) versions 8.0.2 to 8011 and prior versions
Overview
Multiple vulnerabilities have been reported in SonicWall products which could allow an attacker to execute arbitrary code, access sensitive information, data manipulation or cause denial of service (DoS) condition on the targeted system.
Target Audience:
All end user organizations and individuals using affected SonicWall products.
Risk Assessment:
High risk of unauthorized data access and manipulation, denial of service.
Impact Assessment:
Potential for remote code execution, sensitive information disclosure, system instability.
Description
SonicWall offers next-generation firewalls, secure VPNs, wireless security, email protection, and real-time threat intelligence. Its products deliver malware defense, intrusion prevention, content filtering, and secure remote access, providing scalable, easy-to-manage cybersecurity for businesses.
Multiple vulnerabilities exist in the SonicWall products due to inadequate download of Code without integrity verification mechanisms, by injecting crafted directory-traversal sequences, and stack-based buffer overflow in the SonicOS SSLVPN component.
Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, access sensitive information, data manipulation or cause denial of service (DoS) condition on the targeted system.
Solution
Apply appropriate updates as mentioned in:
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0016
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0018
Vendor Information
SonicWall
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0016
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0018
References
SonicWall
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0016
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0018
CVE Name
CVE-2025-40601
CVE-2025-40604
CVE-2025-40605
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=tnOs
—–END PGP SIGNATURE—–


