Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SonicOS SSLVPN Vulnerability Let Attackers Crash the Firewall Remotely

SonicOS SSLVPN Vulnerability Let Attackers Crash the Firewall Remotely

Posted on November 21, 2025November 21, 2025 By CWS

SonicWall has disclosed a important stack-based buffer overflow vulnerability in its SonicOS SSLVPN service. That enables distant unauthenticated attackers to crash firewalls by means of denial-of-service assaults.

The vulnerability was internally found and reported by SonicWall’s safety staff. The flaw, tracked as CVE-2025-40601, carries a CVSS rating of seven.5 and impacts a number of generations of SonicWall firewall merchandise.

FieldValueCVE IDCVE-2025-40601CWECWE-121CVSS Score7.5 (Excessive)CVSS VectorCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Understanding the Vulnerability

The vulnerability exists within the SSLVPN service part of SonicOS and stems from a stack-based buffer overflow weak spot (CWE-121).

When exploited, an attacker can ship specifically crafted requests to the susceptible SSLVPN interface with out authentication, inflicting the affected firewall to crash and interrupting companies.

SonicWall states that this vulnerability solely impacts units with the SSLVPN interface or service enabled on the firewall. Organizations that don’t use this function stay unaffected.

Presently, SonicWall PSIRT stories no energetic exploitation within the wild, and no proof-of-concept code has been publicly launched.

PlatformModelsAffected VersionsFixed VersionGen7 {Hardware} FirewallsTZ270, TZ270W, TZ370, TZ370W, TZ470, TZ470W, TZ570, TZ570W, TZ570P, TZ670, NSa 2700-6700, NSsp 10700-157007.3.0-7012 and older7.3.1-7013 and higherGen7 Digital Firewalls (NSv)NSv270, NSv470, NSv870 (ESX, KVM, HYPER-V, AWS, Azure)7.3.0-7012 and older7.3.1-7013 and higherGen8 FirewallsTZ80, TZ280, TZ380, TZ480, TZ580, TZ680, NSa 2800-58008.0.2-8011 and older8.0.3-8011 and better

The vulnerability impacts each Gen7 and Gen8 SonicWall firewalls throughout {hardware} and digital platforms.

Gen7 units operating firmware variations 7.3.0-7012 and older are susceptible, whereas Gen8 firewalls with variations 8.0.2-8011 and earlier are affected. SonicWall Gen6 firewalls and SMA 1000/100 sequence SSL VPN merchandise aren’t impacted.

SonicWall strongly urges organizations to replace to the patched firmware variations instantly.

Till patches may be utilized, directors ought to limit SSLVPN entry to trusted supply IP addresses solely or disable the service from untrusted web sources by modifying current entry guidelines.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attackers, Crash, Firewall, Remotely, SonicOS, SSLVPN, Vulnerability

Post navigation

Previous Post: OpenAI Releases GPT-5.1-Codex-Max that Performs Coding Tasks Independently
Next Post: SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny

Related Posts

New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182) New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182) Cyber Security News
Pulsar RAT Attacking Windows Systems via Per-user Run Registry Key and Exfiltrates Sensitive Details Pulsar RAT Attacking Windows Systems via Per-user Run Registry Key and Exfiltrates Sensitive Details Cyber Security News
Ferocious Kitten APT Deploying MarkiRAT to Capture Keystroke and Clipboard Logging Ferocious Kitten APT Deploying MarkiRAT to Capture Keystroke and Clipboard Logging Cyber Security News
Belarusian Spyware ResidentBat Targets Journalists with Precision Belarusian Spyware ResidentBat Targets Journalists with Precision Cyber Security News
Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location Cyber Security News
Malware Disguised as Teams and Zoom Apps Targets Enterprises Malware Disguised as Teams and Zoom Apps Targets Enterprises Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark