Description
Multiple post-authentication stack-based buffer overflow vulnerabilities in the SonicOS management interface due to improper bounds checking in a API endpoint.
Published: 2026-02-24
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch When Available
AI Analysis

Impact

An improperly bounded API endpoint in the SonicOS management interface allows a stack‑based buffer overflow after the user has authenticated. This flaw maps to CWE‑121 and can potentially enable an attacker with local or network‑level access to execute arbitrary code within the operating environment, compromising the confidentiality, integrity, and availability of the device and any network traffic passing through it.

Affected Systems

SonicWall SonicOS devices, including the NSA 2700, 2800, 3700, 3800, 4700, 4800, 5700, 5800, 6700, NSSP 10700, 11700, 13700, 15700, NSV270, NSV470, NSV870, TZ270, TZ270W, TZ280, TZ370, TZ370W, TZ380, TZ470, TZ470W, TZ480, TZ570, TZ570P, TZ570W, TZ580, TZ670, TZ680, TZ80, and other SonicOS‑hardware platforms.

Risk and Exploitability

The CVSS base score is 4.9, indicating moderate severity, and the EPSS score is less than 1 %, showing very low exploitation probability as of the last assessment. The vulnerability is not listed in the CISA KEV catalog, meaning no confirmed exploitation has been observed. Based on the description, the likely attack vector is an authenticated user targeting the management API—either a legitimate administrator acting maliciously or an attacker who has compromised credentials. Exploitation requires direct access to the API endpoint, which is normally protected by authentication, but once accessed, the buffer overflow can lead to arbitrary code execution within the device’s kernel space.

Generated by OpenCVE AI on April 18, 2026 at 10:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and install any SonicWall SonicOS firmware updates that contain the buffer overflow fix.
  • Restrict management interface access to trusted administrators, enforce strong authentication, and isolate the management network from general traffic.
  • Monitor management interface logs for anomalous API calls or repeated failures that may indicate attempted exploitation.

Generated by OpenCVE AI on April 18, 2026 at 10:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 11:15:00 +0000

Type Values Removed Values Added
Title Authenticated Stack‑Based Buffer Overflow in SonicOS Management API

Thu, 26 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Sonicwall nsa 2700
Sonicwall nsa 2800
Sonicwall nsa 3700
Sonicwall nsa 3800
Sonicwall nsa 4700
Sonicwall nsa 4800
Sonicwall nsa 5700
Sonicwall nsa 5800
Sonicwall nsa 6700
Sonicwall nssp 10700
Sonicwall nssp 11700
Sonicwall nssp 13700
Sonicwall nssp 15700
Sonicwall nsv270
Sonicwall nsv470
Sonicwall nsv870
Sonicwall tz270
Sonicwall tz270w
Sonicwall tz280
Sonicwall tz370
Sonicwall tz370w
Sonicwall tz380
Sonicwall tz470
Sonicwall tz470w
Sonicwall tz480
Sonicwall tz570
Sonicwall tz570p
Sonicwall tz570w
Sonicwall tz580
Sonicwall tz670
Sonicwall tz680
Sonicwall tz80
CPEs cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_2800:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_3800:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_4800:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_5800:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz280:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz380:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz480:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz580:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz680:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz80:-:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*
Vendors & Products Sonicwall nsa 2700
Sonicwall nsa 2800
Sonicwall nsa 3700
Sonicwall nsa 3800
Sonicwall nsa 4700
Sonicwall nsa 4800
Sonicwall nsa 5700
Sonicwall nsa 5800
Sonicwall nsa 6700
Sonicwall nssp 10700
Sonicwall nssp 11700
Sonicwall nssp 13700
Sonicwall nssp 15700
Sonicwall nsv270
Sonicwall nsv470
Sonicwall nsv870
Sonicwall tz270
Sonicwall tz270w
Sonicwall tz280
Sonicwall tz370
Sonicwall tz370w
Sonicwall tz380
Sonicwall tz470
Sonicwall tz470w
Sonicwall tz480
Sonicwall tz570
Sonicwall tz570p
Sonicwall tz570w
Sonicwall tz580
Sonicwall tz670
Sonicwall tz680
Sonicwall tz80

Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Sonicwall
Sonicwall sonicos
Vendors & Products Sonicwall
Sonicwall sonicos

Tue, 24 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Description Multiple post-authentication stack-based buffer overflow vulnerabilities in the SonicOS management interface due to improper bounds checking in a API endpoint.
Weaknesses CWE-121
References

cve-icon MITRE

Status: PUBLISHED

Assigner: sonicwall

Published:

Updated: 2026-02-24T15:50:29.865Z

Reserved: 2025-12-02T06:28:39.323Z

Link: CVE-2026-0399

cve-icon Vulnrichment

Updated: 2026-02-24T15:50:21.281Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T15:21:36.980

Modified: 2026-02-26T20:00:40.877

Link: CVE-2026-0399

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:00:05Z

Weaknesses