SonicWall Warns of DOS Gap in SSLVPN
SonicWall Patches SONICOS SSLVPN Security Flaw
A vulnerability in SonicWall’s SONICOS firewall operating system could allow attackers to trigger a denial-of-service condition. SonicWall has released updates to address the security gap.
The company issued a security advisory warning of the flaw. The vulnerability, located in the “Virtual Office Interface” of the SONICOS SSLVPN, stems from a zero pointer-dereference. While the exact circumstances remain unspecified, this issue could cause the software to crash.sonicwall reports that there is no evidence of the vulnerability being exploited to inject malicious code.
Network Attacks Possible
According to SonicWall’s description, unauthenticated attackers on the network could exploit this vulnerability (CVE-2025-32818, CVSS score 7.5, categorized as “high” risk). The updated firmware addresses the weakness in the following Gen7 NSV series devices: NSV 270, NSV 470, NSV 870. It also includes Gen7 Firewalls TZ270, TZ270W, TZ370W, TZ470W, TZ570, TZ570W, TZ570P, TZ670, NSA 3700, NSA 4700, NSA 5700, NSA 6700, NSSP 10700, NSSP 11700, and NSSP 15700, specifically in version 7.2.0-7015 and later, as well as the TZ80 series.
SonicWall states that SONICOS Gen6 and Gen7 devices running 7.0.x firmware versions are not affected.
Prompt Updates Recommended
IT managers should promptly install security updates for SonicWall products. Recent attacks have targeted vulnerabilities in SonicWall devices, including the SMA100 series last week. A vulnerability in the SMA100 series, initially disclosed in 2021, has been subject to multiple updates. Though, some administrators may not be applying these patches diligently.
SonicWall Patches SONICOS SSLVPN Security Flaw: Your Questions Answered
welcome! This article provides a comprehensive overview of a recent security vulnerability affecting SonicWall firewalls. We’ll break down the issue,the affected devices,and what you need to do to stay protected.Let’s dive in!
What is the SonicWall SONICOS SSLVPN Security Flaw?
This security flaw is a vulnerability within the SonicWall SONICOS firewall operating system that could allow attackers to trigger a denial-of-service (DoS) condition. Essentially, this means attackers could perhaps crash the firewall if exploited. SonicWall has released updates to fix this gap.
What specific vulnerability are we talking about?
the vulnerability is located in the “Virtual Office Interface” of the SONICOS SSLVPN and stems from a “zero pointer-dereference.” The exact circumstances that trigger it are not fully specified, but this issue could potentially cause the software to crash.
Significant note: While the vulnerability can cause a crash, there’s no evidence yet that it’s being used to inject malicious code.
How is this vulnerability being addressed?
SonicWall has issued a security advisory and released updated firmware to address this vulnerability. Installing these updates is crucial to protect your network.
Which sonicwall Devices are Affected?
The vulnerability affects specific Gen7 NSV series devices and Gen7 firewall devices. Here’s a breakdown:
Gen7 NSV Series: NSV 270, NSV 470, NSV 870
Gen7 Firewalls: TZ270, TZ270W, TZ370W, TZ470W, TZ570, TZ570W, TZ570P, TZ670, NSA 3700, NSA 4700, NSA 5700, NSA 6700, NSSP 10700, NSSP 11700, NSSP 15700, and the TZ80 series.
Specifically, devices running version 7.2.0-7015 and later are included.
Are all SonicWall devices vulnerable?
No. SONICOS Gen6 and Gen7 devices running 7.0.x firmware versions are not affected.
What is the risk level associated with this vulnerability?
The vulnerability (CVE-2025-32818) has a CVSS score of 7.5, which is categorized as “high” risk.
What can attackers do if they exploit this vulnerability?
according to SonicWall’s description, unauthenticated attackers on the network could potentially exploit this vulnerability. While the primary risk is a denial-of-service condition,causing the software to crash,the potential implications extend to network downtime and disruption of service.
How can I protect my network?
Important: IT managers should promptly install the security updates released by SonicWall.
Where can I find the security updates?
You can find the security advisory and details regarding the updates on the SonicWall PSIRT (Product Security incident Response Team) website. The article cites a link that is https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0009.
## What is a “zero pointer-dereference” and why is it a problem?
A “zero pointer-dereference” is a type of software error. In simple terms, it happens when a software program tries to access a memory location that doesn’t exist (or is set to zero). This can lead to a crash because the program is trying to read or write data in a place it isn’t allowed to.
What is SSLVPN?
SSLVPN (Secure Sockets Layer Virtual Private Network) is a technology that allows users to securely connect to a private network, such as a company network, over the internet. SSLVPN uses SSL/TLS protocols to encrypt the connection and protect data transmitted between the user’s device and the network.
Has SonicWall addressed vulnerabilities in the past?
Yes.The article mentions recent attacks have targeted vulnerabilities in SonicWall devices, including the SMA100 series. A vulnerability in the SMA100 series, which was initially disclosed in 2021, has already been subject to multiple updates.
My device is affected, what do I need to do?
Here is a summary of key actions IT managers and system administrators should take:
Identify Affected Devices: Verify the firmware version of your SonicWall devices to determine if they are impacted.
Apply Updates: Promptly download and install the latest firmware updates provided by SonicWall for all affected devices.
* Monitor Your Systems: After installing updates, closely monitor your network and SonicWall devices for any unusual activity.
Here is a summary of the details:
| Vulnerability Summary | Description | Impact | Devices Affected | Firmware Suggestion |
| :——————————– | :————————————————————————————————————————————————- | :——————————————————————— | :—————————————————————————————————————– | :——————————————- |
| Vulnerability ID | CVE-2025-32818 | Possible DoS condition | Gen7 NSV series and Gen7 Firewalls | Update to 7.2.0-7015 or later |
| Location | Virtual Office Interface of the SONICOS SSLVPN | Potential software crash | TZ80 series/ Gen7 NSV series/Gen7 firewalls | (refer to above list of specific devices) |
| CVSS score | 7.5 (High) | Unauthenticated attackers on the network could exploit this vulnerability | 7.2.0-7015 and later versions |
| actions Required | Identify affected devices, apply updates, monitor system | Network downtime and disruption of service | SonicWall’s Gen7 Firewalls | Refer to the specific devices and update notes |
