fkie_cve-2025-40601
Vulnerability from fkie_nvd
Published
2025-11-20 15:17
Modified
2025-12-12 15:57
Severity ?
Summary
A Stack-based buffer overflow vulnerability in the SonicOS SSLVPN service allows a remote unauthenticated attacker to cause Denial of Service (DoS), which could cause an impacted firewall to crash.
References
| URL | Tags | ||
|---|---|---|---|
| PSIRT@sonicwall.com | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0016 | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| sonicwall | sonicos | * | |
| sonicwall | nsa_2700 | - | |
| sonicwall | nsa_3700 | - | |
| sonicwall | nsa_4700 | - | |
| sonicwall | nsa_5700 | - | |
| sonicwall | nsa_6700 | - | |
| sonicwall | nssp_10700 | - | |
| sonicwall | nssp_11700 | - | |
| sonicwall | nssp_13700 | - | |
| sonicwall | nssp_15700 | - | |
| sonicwall | nsv270 | - | |
| sonicwall | nsv470 | - | |
| sonicwall | nsv870 | - | |
| sonicwall | tz270 | - | |
| sonicwall | tz270w | - | |
| sonicwall | tz370 | - | |
| sonicwall | tz370w | - | |
| sonicwall | tz470 | - | |
| sonicwall | tz470w | - | |
| sonicwall | tz570 | - | |
| sonicwall | tz570p | - | |
| sonicwall | tz570w | - | |
| sonicwall | tz670 | - | |
| sonicwall | sonicos | * | |
| sonicwall | nsa_2800 | - | |
| sonicwall | nsa_3800 | - | |
| sonicwall | nsa_4800 | - | |
| sonicwall | nsa_5800 | - | |
| sonicwall | tz280 | - | |
| sonicwall | tz380 | - | |
| sonicwall | tz480 | - | |
| sonicwall | tz580 | - | |
| sonicwall | tz680 | - | |
| sonicwall | tz80 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3D8575AA-96A1-4DAD-9098-B3BF9472B40C",
"versionEndExcluding": "7.3.1-7013",
"versionStartIncluding": "7.1.1-7040",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D8B0C7A-FD65-47CA-A625-150A90EFA7A1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A69E000B-5806-46FD-A233-4E2CC9DD38D2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DF4A322-7CC7-4AB9-B10E-FFF34DF2182D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C15FED5-C48C-47CF-9645-0563D77883C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A884B1BB-F201-4C77-9F6E-B8A884DCD4C2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C3BA5A3-1160-4793-A8D6-40B9D264BCC4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6739DEA3-06FF-4FEB-9931-0DB27F63B70E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0250EDF9-0AEF-4711-8EF6-D447CF48BCAF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7D6CF3CF-256C-4C04-8BDF-B16398CD0459",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DACDCE12-74C2-4F3C-8421-9191700514C5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3AF1ECB1-6257-41E3-A050-6467063F4807",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0883D805-1BA9-49CE-AEC7-51C9D9A69C5C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B60197D0-41B7-46DB-B33E-FEE1F1037A8D",
"versionEndExcluding": "8.0.3-8011",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:nsa_2800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "559FE8B8-E5E1-4E74-98AF-79AF0ECF9064",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_3800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ED8014A-C7A4-4624-8D50-A9844871C1B6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_4800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BDD4AB6-878B-41BE-BA33-6A2ECE2BC85B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_5800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D28BF416-D019-438B-954E-FB94697DC011",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56EC904E-4FCA-4B35-B188-639AE688DD14",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83B9556B-0A33-4A27-B9E2-00F47969A566",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz480:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCFE3403-6A5B-4735-9248-99297A2E4461",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAEE386F-5FE4-4F21-AD34-33B862AAD1CC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz680:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE6BC579-21A1-4C2F-B655-73B14C3409A7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz80:-:*:*:*:*:*:*:*",
"matchCriteriaId": "129CC10F-E822-4BF7-9EB5-0D702020CB0C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Stack-based buffer overflow vulnerability in the SonicOS SSLVPN service allows a remote unauthenticated attacker to cause Denial of Service (DoS), which could cause an impacted firewall to crash."
}
],
"id": "CVE-2025-40601",
"lastModified": "2025-12-12T15:57:37.410",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-11-20T15:17:28.570",
"references": [
{
"source": "PSIRT@sonicwall.com",
"tags": [
"Vendor Advisory"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0016"
}
],
"sourceIdentifier": "PSIRT@sonicwall.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-121"
}
],
"source": "PSIRT@sonicwall.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…