Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance

SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance

Posted on November 21, 2025November 21, 2025 By CWS

SonicWall this week rolled out fixes for high-severity vulnerabilities that may enable attackers to crash firewalls or execute arbitrary recordsdata on Electronic mail Safety home equipment.

Over 30 SonicWall Gen7 and Gen8 firewalls are affected by a stack-based buffer overflow bug within the SonicOS SSL VPN service that could possibly be exploited remotely, with out authentication, to trigger a denial-of-service (DoS) situation resulting in system crashes.

Tracked as CVE-2025-40601 (CVSS rating of seven.2), the problem impacts solely firewalls which have the SonicOS SSLVPN interface or service enabled.

The weak spot was resolved with the discharge of SonicOS variations 7.3.1-7013 and eight.0.2-8011. SonicWall Gen6 firewalls and the SMA 1000 and SMA 100 collection home equipment are usually not affected.

Till they will apply the newly launched fixes, prospects are suggested to restrict SonicOS SSL VPN entry to trusted supply IP addresses, and disable entry from untrusted sources.

SonicWall’s Electronic mail Safety home equipment acquired fixes for 2 safety defects, together with a high-severity flaw that enables attackers to switch system recordsdata and acquire arbitrary code execution.

The primary vulnerability, tracked as CVE-2025-40604 (CVSS rating of seven.2), exists as a result of the home equipment don’t confirm the signature of loaded root filesystem pictures.

The second bug, CVE-2025-40605 (CVSS rating of 4.9), is described as a path traversal concern that may be exploited to control file system paths.Commercial. Scroll to proceed studying.

An attacker can set off the flaw “by injecting crafted directory-traversal sequences (reminiscent of ../) and will entry recordsdata and directories exterior the supposed restricted path”, SonicWall explains.

SonicWall addressed the safety defect in Electronic mail Safety 5000, 5050, 7000, 7050, 9000, VMWare, and Hyper-V home equipment with model 10.0.34.8215.

The corporate says it’s not conscious of any of those vulnerabilities being exploited within the wild. Extra info could be discovered on SonicWall’s safety advisories web page.

Associated: SolarWinds Patches Three Vital Serv-U Vulnerabilities

Associated: Chrome 142 Replace Patches Exploited Zero-Day

Associated: State-Sponsored Hackers Stole SonicWall Cloud Backups in Current Assault

Associated: SonicWall SSL VPN Accounts in Attacker Crosshairs

Security Week News Tags:Appliance, Email, Firewalls, Flaws, HighSeverity, Patches, Security, SonicWall

Post navigation

Previous Post: China-linked APT24 Hackers New BadAudio Compromised Legitimate Public Websites to Attack Users
Next Post: Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security

Related Posts

Mercedes F1 Team Principal Toto Wolff Sells 15% Stake to CrowdStrike CEO George Kurtz Mercedes F1 Team Principal Toto Wolff Sells 15% Stake to CrowdStrike CEO George Kurtz Security Week News
NIST Publishes Guide for Protecting ICS Against USB-Borne Threats NIST Publishes Guide for Protecting ICS Against USB-Borne Threats Security Week News
Will AI-SPM Become the Standard Security Layer for Safe AI Adoption? Will AI-SPM Become the Standard Security Layer for Safe AI Adoption? Security Week News
900 FreePBX Systems Compromised by Web Shell Attacks 900 FreePBX Systems Compromised by Web Shell Attacks Security Week News
AI Systems Vulnerable to Prompt Injection via Image Scaling Attack AI Systems Vulnerable to Prompt Injection via Image Scaling Attack Security Week News
Zania Raises  Million for AI-Powered GRC Platform Zania Raises $18 Million for AI-Powered GRC Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark