Description
A post-authentication Format String vulnerability in SonicOS allows a remote attacker to crash a firewall.
Published: 2026-02-24
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service (Firewall Crash)
Action: Patch
AI Analysis

Impact

A Format String flaw that can only be triggered after the user has successfully authenticated to SonicOS exposes the device to a denial‑of‑service condition. The vulnerability allows a remote actor to construct payloads that lead to a crash of the firewall firmware, resulting in loss of service. The weakness is a classic format string bug (CWE‑134) and does not grant arbitrary code execution.

Affected Systems

SonicWall SonicOS running on a broad range of hardware families, including the NSA series (2700, 2800, 3700, 3800, 4700, 4800, 5700, 5800, 6700), NSSP series (10700, 11700, 13700, 15700), NSV series (270, 470, 870), and TZ series (270, 270w, 280, 370, 370w, 380, 470, 470w, 480, 570, 570p, 570w, 580, 670, 680, 80). All models that run the standard SonicOS firmware are potentially affected.

Risk and Exploitability

The CVSS v3.1 score is 4.9, reflecting moderate impact and limited user requirement. EPSS is below 1%, indicating a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, and it requires the attacker to first authenticate, suggesting the attack vector is remote management access with valid credentials. Because the flaw triggers a crash rather than a code execution, the attack surface is limited to causing service disruption. However, a sustained DoS attack could be leveraged as a stepping stone for further reconnaissance or to distract from other network attacks.

Generated by OpenCVE AI on April 17, 2026 at 15:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official SonicOS firmware update that removes the format string bug as published by SonicWall.
  • Verify that all remote management interfaces are protected with strong authentication and consider limiting access to trusted IP ranges. Maintain a redundant firewall or fail‑over mechanism to mitigate downtime if a crash does occur.
  • Monitor system logs for sudden resets or crash indicators and alert security staff if repeated crashes are detected.

Generated by OpenCVE AI on April 17, 2026 at 15:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Title Post-Authentication Format String Vulnerability Leading to Firewall Crash

Thu, 26 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Sonicwall nsa 2700
Sonicwall nsa 2800
Sonicwall nsa 3700
Sonicwall nsa 3800
Sonicwall nsa 4700
Sonicwall nsa 4800
Sonicwall nsa 5700
Sonicwall nsa 5800
Sonicwall nsa 6700
Sonicwall nssp 10700
Sonicwall nssp 11700
Sonicwall nssp 13700
Sonicwall nssp 15700
Sonicwall nsv270
Sonicwall nsv470
Sonicwall nsv870
Sonicwall tz270
Sonicwall tz270w
Sonicwall tz280
Sonicwall tz370
Sonicwall tz370w
Sonicwall tz380
Sonicwall tz470
Sonicwall tz470w
Sonicwall tz480
Sonicwall tz570
Sonicwall tz570p
Sonicwall tz570w
Sonicwall tz580
Sonicwall tz670
Sonicwall tz680
Sonicwall tz80
CPEs cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_2800:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_3800:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_4800:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_5800:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz280:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz380:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz480:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz580:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz680:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz80:-:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*
Vendors & Products Sonicwall nsa 2700
Sonicwall nsa 2800
Sonicwall nsa 3700
Sonicwall nsa 3800
Sonicwall nsa 4700
Sonicwall nsa 4800
Sonicwall nsa 5700
Sonicwall nsa 5800
Sonicwall nsa 6700
Sonicwall nssp 10700
Sonicwall nssp 11700
Sonicwall nssp 13700
Sonicwall nssp 15700
Sonicwall nsv270
Sonicwall nsv470
Sonicwall nsv870
Sonicwall tz270
Sonicwall tz270w
Sonicwall tz280
Sonicwall tz370
Sonicwall tz370w
Sonicwall tz380
Sonicwall tz470
Sonicwall tz470w
Sonicwall tz480
Sonicwall tz570
Sonicwall tz570p
Sonicwall tz570w
Sonicwall tz580
Sonicwall tz670
Sonicwall tz680
Sonicwall tz80

Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Sonicwall
Sonicwall sonicos
Vendors & Products Sonicwall
Sonicwall sonicos

Tue, 24 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Description A post-authentication Format String vulnerability in SonicOS allows a remote attacker to crash a firewall.
Weaknesses CWE-134
References

cve-icon MITRE

Status: PUBLISHED

Assigner: sonicwall

Published:

Updated: 2026-02-24T15:35:10.650Z

Reserved: 2025-12-02T06:28:43.819Z

Link: CVE-2026-0400

cve-icon Vulnrichment

Updated: 2026-02-24T15:35:06.824Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T15:21:37.127

Modified: 2026-02-26T21:03:56.033

Link: CVE-2026-0400

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:00:11Z

Weaknesses