Impact
The vulnerability is a path traversal flaw that exists after an attacker logs into the SonicOS device. By manipulating file paths, the attacker can reach and control services that are normally hidden or protected by the authentication layer. This allows the attacker to read or modify system configuration files and gain unauthorized access, potentially compromising confidentiality and integrity of the network infrastructure.
Affected Systems
The flaw is reported in SonicWall SonicOS, but no specific version or build numbers are listed in the CNA data. Administrators should review the SonicWall advisories to identify which firmware releases include the fix.
Risk and Exploitability
The CVSS score is 6.8, but the EPSS score is unavailable, making it unclear how often this vulnerability is exploited. The advisory does not state that the issue is in the CISA KEV catalog, so it is not known to be actively leveraged in the wild. Attackers would need to already have authenticated access to the device to exploit the path traversal; the failure to verify proper path sanitization provides a relatively low barrier to exploitation for a privileged user.
OpenCVE Enrichment