Impact
A stack‑based buffer overflow in SonicOS requires the attacker to be authenticated and results in the crash of a firewall device. The detailed description states that the flaw causes a device reset rather than granting code execution, so the primary consequence is an interruption of network services. The exploited vulnerability is a classic CWE‑121 type overflow, implying insufficient bounds checking in a critical subsystem.
Affected Systems
The vulnerability affects SonicWall devices running the SonicOS operating system. No specific firmware or hardware versions are disclosed in the available data, so all SonicOS installations are potentially at risk until an update is applied.
Risk and Exploitability
Since the flaw is post‑authentication, an attacker must first obtain valid credentials to reach the vulnerable code path. The CVSS score of 4.9 indicates moderate overall risk, and the EPSS score is not available. The vulnerability is not listed in the CISA KEV catalog. Because the exploit would only terminate the device’s operation, the impact is limited to availability, but it could disrupt critical traffic if the system is not redundant, thus representing a significant risk to operational continuity.
OpenCVE Enrichment