Download of Code Without Integrity Check Vulnerability in the SonicWall Email Security appliance loads root filesystem images without verifying signatures, allowing attackers with VMDK or datastore access to modify system files and gain persistent arbitrary code execution.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 20 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 20 Nov 2025 12:30:00 +0000

Type Values Removed Values Added
Description Download of Code Without Integrity Check Vulnerability in the SonicWall Email Security appliance loads root filesystem images without verifying signatures, allowing attackers with VMDK or datastore access to modify system files and gain persistent arbitrary code execution.
Weaknesses CWE-494
References

cve-icon MITRE

Status: PUBLISHED

Assigner: sonicwall

Published:

Updated: 2025-11-21T05:02:06.383Z

Reserved: 2025-04-16T08:34:51.361Z

Link: CVE-2025-40604

cve-icon Vulnrichment

Updated: 2025-11-20T18:28:54.889Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-20T15:17:28.750

Modified: 2025-11-21T15:13:59.083

Link: CVE-2025-40604

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.