Skip to main content
News Directory 3
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
Menu
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
SonicWall Warns of DOS Gap in SSLVPN

SonicWall Warns of DOS Gap in SSLVPN

April 24, 2025 Catherine Williams - Chief Editor Tech

SonicWall Patches​ SONICOS SSLVPN​ Security Flaw

A vulnerability in SonicWall’s SONICOS firewall operating system could​ allow attackers to trigger a denial-of-service condition. SonicWall has released updates to address the security gap.

The company issued a security advisory warning of‌ the flaw. The vulnerability, located in the “Virtual Office Interface” of the SONICOS SSLVPN, stems from a zero pointer-dereference. While the exact circumstances remain ‌unspecified, this issue could cause the​ software​ to crash.sonicwall reports that⁤ there is no evidence of the vulnerability being exploited to inject malicious code.

Network Attacks Possible

According to SonicWall’s description, unauthenticated attackers on the network could exploit this vulnerability (CVE-2025-32818, CVSS score 7.5, ‌categorized as “high” risk). The updated firmware addresses the weakness in the following ‌Gen7 NSV series devices: NSV 270, NSV 470, NSV 870. It also includes Gen7 Firewalls TZ270, TZ270W, TZ370W, TZ470W, TZ570, TZ570W, TZ570P, ⁣TZ670, NSA 3700, NSA 4700, NSA 5700, NSA 6700, NSSP 10700, NSSP 11700, and NSSP 15700, specifically ⁤in version 7.2.0-7015 and later, as well as the TZ80 series.

SonicWall ‌states that⁤ SONICOS Gen6 and Gen7 devices running 7.0.x firmware versions are not affected.

Prompt Updates Recommended

IT managers should promptly install security updates for SonicWall products. Recent attacks have targeted vulnerabilities in SonicWall devices, including the SMA100 series last week. A vulnerability in the SMA100 series, initially disclosed in 2021, has been subject to multiple ‌updates. Though, some administrators may not be applying these patches diligently.

SonicWall Patches SONICOS SSLVPN Security Flaw: Your Questions Answered

welcome! This article provides a comprehensive overview of⁢ a recent security vulnerability ⁤affecting SonicWall firewalls. We’ll break​ down the issue,the⁢ affected devices,and what you need to do to stay protected.Let’s dive ⁢in!

What‍ is the SonicWall SONICOS SSLVPN Security Flaw?

This security flaw is a vulnerability within the SonicWall SONICOS firewall operating system that ‌could allow ⁣attackers to trigger a denial-of-service (DoS)‌ condition. Essentially, ‌this means⁢ attackers could ‍perhaps crash the firewall if exploited. SonicWall has released updates to fix this gap.

What specific vulnerability are we⁢ talking about?

the vulnerability is​ located in the “Virtual Office Interface” of the SONICOS SSLVPN and stems⁢ from a “zero pointer-dereference.” The exact ⁤circumstances ‍that trigger it are not fully specified, ⁤but this issue could potentially cause the software ‌to ​crash.

Significant ⁤note: While the vulnerability can⁢ cause ​a crash, there’s no⁣ evidence yet ⁤that it’s being used to inject‌ malicious code.

How is this vulnerability being addressed?

SonicWall has issued a security advisory and released updated firmware⁣ to address this vulnerability. Installing these ​updates is‍ crucial to protect your network.

Which sonicwall Devices are Affected?

The vulnerability affects specific Gen7 NSV⁤ series ​devices ‌and Gen7 firewall devices. Here’s a breakdown:

Gen7 NSV Series: NSV 270, NSV 470, NSV 870

Gen7 Firewalls: TZ270, TZ270W, TZ370W, TZ470W, TZ570, TZ570W, TZ570P, TZ670, NSA 3700, NSA 4700, NSA 5700, NSA 6700, NSSP 10700,‍ NSSP ⁤11700, NSSP 15700, and ⁢the TZ80 series.

Specifically, devices running version 7.2.0-7015 and ⁤later are included.

Are all‍ SonicWall devices vulnerable?

No. SONICOS Gen6 and Gen7 devices running 7.0.x firmware versions are not affected.

What is the risk level associated with this ​vulnerability?

The vulnerability (CVE-2025-32818) has a CVSS score of 7.5, which is categorized as “high” risk.

What can attackers do if they exploit​ this vulnerability?

according to SonicWall’s description, ⁣unauthenticated attackers on the ⁤network could potentially exploit this vulnerability. While the⁣ primary risk is a denial-of-service condition,causing the‌ software ​to crash,the potential ⁣implications extend to​ network ‌downtime and disruption of service.

How can I protect ​my network?

Important: ⁢ IT managers should⁤ promptly‌ install the security updates released by SonicWall.

Where can I find the security updates?

You can find the security advisory‍ and details regarding the updates on ⁢the SonicWall PSIRT (Product Security incident‌ Response Team) website. The article cites a link that is https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0009.

‍## What is a “zero ⁣pointer-dereference” and why⁢ is it ⁣a problem?

A “zero pointer-dereference” is a type of software error. In simple terms, it happens when a software program tries to access a memory location ‍that doesn’t exist (or is set to zero). This can lead to a crash because the program ‍is trying to⁢ read or ⁤write data in a place it isn’t allowed to.

What is SSLVPN?

SSLVPN (Secure Sockets Layer Virtual Private ⁢Network) is⁢ a technology that allows users to securely ‍connect to ⁤a private network, such as a ⁢company network,‌ over the internet. SSLVPN uses SSL/TLS protocols to ⁤encrypt the connection and protect data transmitted between the user’s device and ​the network.

Has SonicWall⁣ addressed vulnerabilities in the past?

Yes.The article mentions recent attacks have targeted vulnerabilities in SonicWall devices, including the SMA100 series. A vulnerability⁤ in the SMA100 series, which was initially disclosed in 2021, has already been subject ‌to multiple updates.

My device is affected,⁢ what‌ do I need to⁤ do?

Here is a summary of key actions IT managers and system administrators should take:

Identify Affected Devices: Verify the firmware version of your SonicWall devices to determine if they are impacted.

Apply Updates: Promptly‌ download and install the‌ latest firmware updates provided by ⁤SonicWall for all affected devices.

* Monitor ‍Your Systems: After installing updates, closely monitor your network and SonicWall devices for any unusual activity.

Here ‌is a summary of the details:

| Vulnerability Summary ⁢ | Description ⁤ ⁣ ‌ ⁤ ⁤ ‍⁤ ⁢ ⁢ ​ ​ | Impact ‌ ⁤ ⁢ ​ ‌ ‌ | Devices Affected ⁤ ⁢ | Firmware Suggestion ⁢ |

| :——————————– | :————————————————————————————————————————————————- | :——————————————————————— | :—————————————————————————————————————– | :——————————————- |

| Vulnerability ID‍ |​ CVE-2025-32818 ‌ ⁤ ⁣ ​ ‍ ⁤ ⁤ ‍ ⁢ ⁣ ⁣ ⁤ | Possible DoS condition ⁣ ‍ ⁢ ​ ‌ ​ ⁣ | Gen7 NSV series ‍and Gen7 Firewalls ​ ⁤ ⁢ ‍ ​ | Update to 7.2.0-7015 or later ⁢ |

|⁣ Location ⁤ | Virtual ‍Office​ Interface‌ of the SONICOS SSLVPN ⁣ ⁢ ​ ⁣ ⁢ ‍ ⁣ ⁣ ⁣ ‍ ‌ ⁤ | Potential software crash ​ ‍ ​‌ | TZ80 series/ Gen7 NSV series/Gen7 firewalls ‌‍ ⁣ ⁤ ⁣ ⁤ ‍ ‌ ⁢ ​ | (refer ‍to above list of specific devices) ⁣​ |

| CVSS score ‍| ⁤7.5 (High) ⁣ ⁣ ⁣ ⁣ ⁢ ⁢ ⁢ ⁤ ‍ ⁢ ⁢ ⁤​ ‍ ‍ ‍ | Unauthenticated attackers on the network could exploit this vulnerability‍ ​ ⁤ ⁣ ​ ​ ‍⁤ ⁣ ⁣ ⁣ | 7.2.0-7015 and later versions ⁣ ⁤ ⁢ ⁢ ‍ ​ |

| ⁢ actions Required ⁢ | Identify affected devices, apply updates, monitor system | Network downtime and disruption of service | ​SonicWall’s Gen7 Firewalls ⁢ ‌⁣ ‍ ⁢ ⁤ ⁤ ⁣ ⁣ | Refer to the specific‌ devices and update⁢ notes ‌ ‍|

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X

Related

alert, Dell, It, security, Security gaps, Security updates, SonicOS, SSLVPN

Search:

News Directory 3

ByoDirectory is a comprehensive directory of businesses and services across the United States. Find what you need, when you need it.

Quick Links

  • Copyright Notice
  • Disclaimer
  • Terms and Conditions

Browse by State

  • Alabama
  • Alaska
  • Arizona
  • Arkansas
  • California
  • Colorado

Connect With Us

© 2026 News Directory 3. All rights reserved.

Privacy Policy Terms of Service