Connect with us

Security

Exploiting a New Vulnerability: How Hackers Can Disable SonicWall Firewalls

Published

on

SonicWall Urges Customers to Patch High-Severity SSLVPN Security Flaw

Recent cybersecurity reports have highlighted a critical security flaw in SonicWall’s SonicOS SSLVPN service. The vulnerability, tracked as CVE-2025-40601, poses a significant threat to vulnerable Gen8 and Gen7 firewalls, both hardware and virtual. This flaw, a stack-based buffer overflow, allows attackers to crash affected firewalls, leading to potential Denial of Service (DoS) attacks.

SonicWall has emphasized the importance of patching this vulnerability promptly to prevent any exploitation. While there have been no reports of active exploitation in the wild or the release of a Proof of Concept (PoC), the company advises network defenders to take precautionary measures to safeguard their systems.

Notably, SonicWall has confirmed that its Gen6 firewalls and SMA 1000/100 series SSL VPN products are not vulnerable to this specific attack. However, to ensure comprehensive security, the company encourages all users to follow the guidance provided in the latest security advisory.

Affected Platforms and Fixed Versions

Affected Platforms Fixed versions
Gen7 hardware Firewalls – TZ270, TZ270W, TZ370, TZ370W, TZ470, TZ470W, TZ570, TZ570W, TZ570P, TZ670, NSa 2700, NSa 3700, NSa 4700, NSa 5700, NSa 6700, NSsp 10700, NSsp 11700, NSsp 13700, NSsp 15700
Gen7 virtual Firewalls (NSv) – NSV270, NSv470, NSv870 (ESX, KVM, HYPER-V, AWS, Azure)
7.3.1-7013 and higher versions
Gen8 Firewalls – TZ80, TZ280, TZ380, TZ480, TZ580, TZ680, NSa 2800, NSa 3800, NSa 4800, NSa 5800 8.0.3-8011 and higher versions

For administrators unable to immediately deploy the security updates, SonicWall recommends disabling the SonicOS SSLVPN service or implementing restrictions to limit access to trusted sources.

Aside from the SSLVPN vulnerability, SonicWall has also addressed two critical vulnerabilities affecting its Email Security appliances. These vulnerabilities (CVE-2025-40604 and CVE-2025-40605) could enable remote attackers to execute arbitrary code and access restricted information. Users of Email Security products are strongly advised to upgrade to the latest versions for enhanced protection.

Recent incidents, including a state-sponsored breach in September and the discovery of Overstep rootkit malware targeting SMA 100 series devices, underscore the importance of proactive security measures. SonicWall continues to enhance its security protocols to mitigate potential risks and protect its users.

Wiz

Amidst budget season, over 300 CISOs and security leaders have shared insights on planning, spending, and prioritizing for the upcoming year. Gain valuable information on emerging trends and strategic benchmarks to navigate the evolving cybersecurity landscape.

Discover how top leaders are translating investments into tangible outcomes.

See also  New YouTube Feature Allows Users to Disable AI Upscaling for Low-Resolution Videos

Trending