SonicWall has released a security update to fix a privilege escalation vulnerability in the SonicWall SMA1000 Appliance Management Console (AMC) that was tricked in zero-day attacks to escalate privileges.
Summary : A security flaw was discovered in SonicWall’s SonicOS SSLVPN component, affecting both hardware and virtual firewall appliances across Gen7 and Gen8 product lines.
OEM
SonicWall
Severity
High
CVSS Score
7.5
CVEs
CVE-2025-40601
POC Available
No
Actively Exploited
No
Exploited in Wild
No
Advisory Version
1.0
Overview
The SonicWall vulnerability allows remote attackers, without any authentication, to crash into affected firewalls by sending specially crafted traffic to the SSLVPN service. There are no public exploitation in the wild but it is strongly advised customers to apply the available patches immediately to minimize risk.
In simple terms, the component fails to validate the size or structure of certain data before copying it to a stack‐allocated buffer. Under malicious input, the overflow can overwrite the stack, leading the firewall device to crash.
Vulnerability Name
CVE ID
Product Affected
Severity
Fixed Version
Stack-based buffer overflow in SonicOS SSLVPN service
CVE-2025-40601
SonicWall SonicOS Firewalls (Gen7 and Gen8 Hardware and Virtual)
High
7.3.1-7013 (Gen7), 8.0.3-8011 (Gen8) and latest one
Technical Summary
The vulnerability occurs due to a stack-based buffer overflow affecting the SSLVPN service of SonicOS. Devices with the SSLVPN interface enabled are vulnerable.
This flaw permits remote unauthenticated attackers to trigger a denial-of-service condition, leading to a full firewall crash and service outage.
The problem impacts a wide range of SonicWall firewall models including Gen7 (TZ270, NSa 2700 series etc) and Gen8 (TZ280, NSa 2800 series etc). Administrators are urged to upgrade to the latest versions and restrict SSLVPN access to trusted IPs or disable external-facing SSLVPN portals until remediation is complete.
CVE ID
Component Affected
Vulnerability Details
Impact
CVE-2025-40601
SonicWall SonicOS SSLVPN service
Stack-based buffer overflow allows remote unauthenticated attackers to send crafted requests causing a denial-of-service crash of the firewall. Only devices with SSLVPN enabled are vulnerable.
Remote denial-of-service
Recommendations
Update SonicWall immediately to the following fixed versions:
Gen7 Hardware Firewalls: 7.3.1-7013 and higher versions
Gen7 Virtual Firewalls : 7.3.1-7013 and higher versions
Gen8 Firewalls: 8.0.3-8011 and higher.
You can follow some below workaround here
Temporarily disable the SSLVPN service if possible or restrict SSLVPN access only to trusted source IP addresses.
Avoid exposing the SSLVPN service to untrusted internet sources until patched.
Continuously monitor firewall and network logs for unusual SSLVPN activity or connection attempts that might indicate probing or exploitation attempts.
Conclusion: There has no evidence of active exploitation for this vulnerability, but the issue makes unpatched firewalls highly attractive targets for threat actors capable of causing major network outages.
Organizations relying on SonicWall should prioritize applying the latest patches and review their SSLVPN exposure as part of broader incident prevention. For those unable to patch immediately, restricting or disabling external SSLVPN access is strongly recommended until fixes can be deployed.
SonicWall has released an Critical advisory urging administrators to address a critical vulnerability in its SSL-VPN product.
The flaw, identified as CVE-2024-53704, poses a significant security risk, allowing attackers to exploit the system remotely. Administrators are strongly encouraged to update their systems immediately to mitigate potential threats. SonicWall has released an Critical advisory urging administrators to address a critical vulnerability in its SSL-VPN product.
Key Details:
The vulnerability allows unauthenticated remote attackers to execute arbitrary code on affected systems.
It impacts SonicWall’s SSL-VPN products, widely used for secure remote access.
Exploitation of this bug could lead to severe consequences, including unauthorized access to sensitive data, network infiltration, and system compromise.
Summary
OEM
SonicWall
Severity
High
CVSS
8.2
CVEs
CVE-2024-53704
Exploited in Wild
No
Patch/Remediation Available
Yes
Advisory Version
1.0
Overview
The security flaw, tracked as CVE-2024-53704, presents a serious risk, enabling remote exploitation by attackers. Administrators are highly advised to apply the necessary patches without delay to protect against potential threats.
Vulnerability Name
CVE ID
Product Affected
Severity
Affected Version
Improper Authentication
CVE-2024-53704
SonicWall
High
7.1.x (7.1.1-7058 and older), 7.1.2-7019 8.0.0-8035
A privilege escalation vulnerability
CVE-2024-53706
SonicWall
High
7.1.x (7.1.1-7058 and older), 7.1.2-7019
A weakness in the SSLVPN authentication token generator
CVE-2024-40762
SonicWall
High
7.1.x (7.1.1-7058 and older), 7.1.2-7019
A server-side request forgery (SSRF) vulnerability
CVE-2024-53705
SonicWall
Medium
6.5.4.15-117n and older 7.0.x (7.0.1-5161 and older)
Technical Summary
CVE ID
System Affected
Vulnerability Details
Impact
CVE-2024-53704
Gen7 Firewalls, Gen7 NSv, TZ80
An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication.
Bypass authentication
CVE-2024-53706
Gen7 Cloud Platform NSv
A vulnerability in the Gen7 SonicOS Cloud platform NSv (AWS and Azure editions only), allows a remote authenticated local low-privileged attacker to elevate privileges to `root` and potentially lead to code execution.
Allow attackers to gain root privileges and potentially execute code.
CVE-2024-40762
Gen7 Firewalls, Gen7 NSv, TZ80
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in the SonicOS SSLVPN authentication token generator that, in certain cases, can be predicted by an attacker potentially resulting in authentication bypass.
Weak PRNG in authentication tokens can lead to authentication bypass in SSLVPN.
CVE-2024-53705
Gen6 Hardware Firewalls, Gen7 Firewalls, Gen7 NSv
A Server-Side Request Forgery vulnerability in the SonicOS SSH management interface allows a remote attacker to establish a TCP connection to an IP address on any port when the user is logged in to the firewall.
Allow attackers to establish TCP connections to arbitrary IP addresses and ports
Remediation:
Update: Impacted users are recommended to upgrade to the following versions to address the security risk:
Firewalls Versions
Fixes and Releases
Gen 6 / 6.5 hardware firewalls
SonicOS 6.5.5.1-6n or newer
Gen 6 / 6.5 NSv firewalls
SonicOS 6.5.4.v-21s-RC2457 or newer
Gen 7 firewalls
SonicOS 7.0.1-5165 or newer; 7.1.3-7015 and higher
TZ80: SonicOS
SonicOS 8.0.0-8037 or newer
Recommendations:
Patch Without Delay: Install the latest firmware update from SonicWall to resolve this vulnerability. Detailed instructions are available in SonicWall’s official advisory.
Monitor Network Activity: Regularly monitor network traffic for signs of suspicious or unauthorized access.
Limit Access: Restrict VPN access to trusted users and enforce Multi-Factor Authentication (MFA) for all accounts.
Stay Updated: Subscribe to SonicWall’s security alerts and updates to stay informed about upcoming vulnerabilities.
Recent Comments