SonicWall has disclosed a significant security vulnerability affecting its Gen7 firewall products that could allow remote attackers to disrupt network services without authentication.
The vulnerability, tracked as CVE-2025-40600 and assigned advisory ID SNWLID-2025-0013, was first published on July 29, 2025, with updates released the following day.
Despite being classified with a medium CVSS score of 5.9, the vulnerability poses serious concerns for organizations relying on SonicWall’s SSL VPN functionality for remote access solutions.
The security vulnerability stems from a use of externally-controlled format string vulnerability within SonicOS’s SSL VPN interface, categorized under CWE-134.
This type of vulnerability occurs when user-supplied data is improperly handled in format string functions, potentially allowing attackers to manipulate program execution or cause system instability.
The vulnerability enables remote unauthenticated attackers to trigger denial-of-service conditions, effectively disrupting the availability of affected firewall systems.
The CVSS vector CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H indicates that while the attack can be conducted remotely over the network without requiring privileges or user interaction, it has high attack complexity.
The primary impact is on system availability, with no direct effect on confidentiality or integrity.
However, the ability to disrupt firewall services remotely presents significant operational risks, particularly for organizations that depend on continuous network security monitoring and SSL VPN connectivity for remote workers.
The vulnerability specifically impacts SonicWall Gen7 firewall products across multiple deployment models. The affected systems include:
Hardware Firewalls:
Virtual Firewalls (NSv):
Vulnerable Software Versions:
Unaffected Systems:
SonicWall strongly recommends immediate upgrading to the fixed software version 7.3.0-7012 or higher to completely address this vulnerability.
For organizations unable to immediately deploy the patched version, SonicWall provides a workaround solution: disabling the SSL-VPN interface entirely.
This mitigation effectively eliminates the attack vector since the vulnerability specifically targets the firewall’s SSL-VPN component, leaving systems without SSL-VPN enabled completely unaffected.
Organizations should prioritize this update, particularly those heavily reliant on SSL VPN functionality for remote access.
The availability of both a permanent fix and temporary workaround provides flexibility for different deployment scenarios and maintenance windows, ensuring that network security can be maintained while planning appropriate remediation strategies.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…