Description
A post-authentication NULL Pointer Dereference vulnerability in SonicOS allows a remote attacker to crash a firewall.
Published: 2026-02-24
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of service via crash of the firewall
Action: Apply Patch
AI Analysis

Impact

A post‑authentication NULL pointer dereference in SonicOS allows a remote attacker to crash the firewall by sending specially crafted input. The core weakness resides in the code handling an unspecified packet, causing a segmentation fault when the pointer is dereferenced. The crash interrupts firewall operation, potentially dropping all traffic that flows through the affected device. The primary impact is a denial‑of‑service that can disrupt network connectivity.

Affected Systems

Devices running SonicOS versions on multiple SonicWall hardware families including the NSA 2700, 2800, 3700, 3800, 4700, 4800, 5700, 5800, 6700 series, and the NSSP 10700, 11700, 13700, 15700, NSV270, NSV470, NSV870, TZ270, TZ280, TZ370, TZ380, TZ470, TZ480, TZ570, TZ570p, TZ570w, TZ580, TZ670, TZ680, TZ80, as well as the generic SonicOS firmware are susceptible. Exact affected firmware revisions are not listed, so all recent releases prior to an identified fix should be considered vulnerable.

Risk and Exploitability

The CVSS score of 4.9 reflects moderate severity, largely due to the post‑authentication requirement. However, the EPSS score is <1 %, indicating that exploit activity is expected to be very low, and the vulnerability is currently not catalogued in CISA’s KEV list. The attack vector requires valid administrative credentials to trigger the crash, making remote exploitation less likely but still dangerous for exposed firewalls. If the vulnerability remains unpatched, an attacker could mount a DoS attack by repeatedly sending the malicious input, potentially taking the firewall offline and undermining network availability.

Generated by OpenCVE AI on April 17, 2026 at 15:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and install the latest SonicOS firmware that addresses the NULL pointer dereference issue.
  • If a direct firmware upgrade is not yet available, isolate the firewall from external management interfaces and restrict remote access to trusted networks only until the patch is released.
  • Configure the firewall to generate alerts on unexpected crash or restart events and review logs to detect potential malicious activity.

Generated by OpenCVE AI on April 17, 2026 at 15:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Title Null Pointer Dereference Crash Vulnerability in SonicOS

Thu, 26 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Sonicwall nsa 2700
Sonicwall nsa 2800
Sonicwall nsa 3700
Sonicwall nsa 3800
Sonicwall nsa 4700
Sonicwall nsa 4800
Sonicwall nsa 5700
Sonicwall nsa 5800
Sonicwall nsa 6700
Sonicwall nssp 10700
Sonicwall nssp 11700
Sonicwall nssp 13700
Sonicwall nssp 15700
Sonicwall nsv270
Sonicwall nsv470
Sonicwall nsv870
Sonicwall tz270
Sonicwall tz270w
Sonicwall tz280
Sonicwall tz370
Sonicwall tz370w
Sonicwall tz380
Sonicwall tz470
Sonicwall tz470w
Sonicwall tz480
Sonicwall tz570
Sonicwall tz570p
Sonicwall tz570w
Sonicwall tz580
Sonicwall tz670
Sonicwall tz680
Sonicwall tz80
CPEs cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_2800:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_3800:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_4800:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_5800:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz280:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz380:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz480:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz580:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz680:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz80:-:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*
Vendors & Products Sonicwall nsa 2700
Sonicwall nsa 2800
Sonicwall nsa 3700
Sonicwall nsa 3800
Sonicwall nsa 4700
Sonicwall nsa 4800
Sonicwall nsa 5700
Sonicwall nsa 5800
Sonicwall nsa 6700
Sonicwall nssp 10700
Sonicwall nssp 11700
Sonicwall nssp 13700
Sonicwall nssp 15700
Sonicwall nsv270
Sonicwall nsv470
Sonicwall nsv870
Sonicwall tz270
Sonicwall tz270w
Sonicwall tz280
Sonicwall tz370
Sonicwall tz370w
Sonicwall tz380
Sonicwall tz470
Sonicwall tz470w
Sonicwall tz480
Sonicwall tz570
Sonicwall tz570p
Sonicwall tz570w
Sonicwall tz580
Sonicwall tz670
Sonicwall tz680
Sonicwall tz80

Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Sonicwall
Sonicwall sonicos
Vendors & Products Sonicwall
Sonicwall sonicos

Tue, 24 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}


Tue, 24 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Description A post-authentication NULL Pointer Dereference vulnerability in SonicOS allows a remote attacker to crash a firewall.
Weaknesses CWE-476
References

cve-icon MITRE

Status: PUBLISHED

Assigner: sonicwall

Published:

Updated: 2026-02-24T15:34:30.604Z

Reserved: 2025-12-02T06:28:46.045Z

Link: CVE-2026-0401

cve-icon Vulnrichment

Updated: 2026-02-24T15:34:24.476Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T15:21:37.267

Modified: 2026-02-26T21:03:06.480

Link: CVE-2026-0401

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:00:11Z

Weaknesses