Description
A post-authentication Out-of-bounds Read vulnerability in SonicOS allows a remote attacker to crash a firewall.
Published: 2026-02-24
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via Out-of-Bounds Read
Action: Apply Updates
AI Analysis

Impact

This vulnerability is a post-authentication out-of-bounds read in the SonicOS operating system. The flaw allows an authenticated user with sufficient privileges to trigger a memory read beyond valid bounds, which can cause the firewall process to crash. The impact is a denial of service that could interrupt network traffic and potentially disrupt business operations. The weakness is classified as CWE-125, indicating that the code does not properly check array bounds before accessing memory.

Affected Systems

Affected vendors and products include SonicWall SonicOS devices such as the NSA 2700, 2800, 3700, 3800, 4700, 4800, 5700, 5800, 6700 series, NSSP 10700, 11700, 13700, 15700, and NSV 270, 470, 870; TZ 270, 270w, 280, 370, 370w, 380, 470, 470w, 480, 570, 570p, 570w, 580, 670, 680, 80 series routers and switches, as well as all SonicOS firmware releases. The vendor list is derived from the CPE entries, and specific version details are not disclosed in the input.

Risk and Exploitability

The CVSS score of 4.9 indicates moderate severity, and an EPSS score of 0.00216 indicates an extremely low likelihood of exploitation in the wild at this time. The vulnerability is not listed in the CISA KEV catalog, implying no known active exploits targeting it. Attackers would first need to authenticate to the device, likely using compromised credentials or exploiting other local entry points, and then execute a crafted request that triggers the out-of-bounds read, leading to a service outage. Without an exploit code or widespread exposure, the risk remains primarily a local or privileged threat that can be mitigated by updating firmware and hardening access controls.

Generated by OpenCVE AI on April 18, 2026 at 10:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the latest SonicOS firmware release that contains the fix for the out-of-bounds read vulnerability
  • Restrict administrative access to the firewall by enforcing strong authentication, role-based access control, and network segmentation
  • Monitor firewall logs for abnormal crash events and configure alerting to detect potential exploitation attempts

Generated by OpenCVE AI on April 18, 2026 at 10:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 11:15:00 +0000

Type Values Removed Values Added
Title Post-Authentication Out-of-Bounds Read Leading to Firewall Crash

Thu, 26 Feb 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Sonicwall nsa 2700
Sonicwall nsa 2800
Sonicwall nsa 3700
Sonicwall nsa 3800
Sonicwall nsa 4700
Sonicwall nsa 4800
Sonicwall nsa 5700
Sonicwall nsa 5800
Sonicwall nsa 6700
Sonicwall nssp 10700
Sonicwall nssp 11700
Sonicwall nssp 13700
Sonicwall nssp 15700
Sonicwall nsv270
Sonicwall nsv470
Sonicwall nsv870
Sonicwall tz270
Sonicwall tz270w
Sonicwall tz280
Sonicwall tz370
Sonicwall tz370w
Sonicwall tz380
Sonicwall tz470
Sonicwall tz470w
Sonicwall tz480
Sonicwall tz570
Sonicwall tz570p
Sonicwall tz570w
Sonicwall tz580
Sonicwall tz670
Sonicwall tz680
Sonicwall tz80
CPEs cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_2800:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_3800:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_4800:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_5800:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz280:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz380:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz480:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz580:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz680:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz80:-:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*
Vendors & Products Sonicwall nsa 2700
Sonicwall nsa 2800
Sonicwall nsa 3700
Sonicwall nsa 3800
Sonicwall nsa 4700
Sonicwall nsa 4800
Sonicwall nsa 5700
Sonicwall nsa 5800
Sonicwall nsa 6700
Sonicwall nssp 10700
Sonicwall nssp 11700
Sonicwall nssp 13700
Sonicwall nssp 15700
Sonicwall nsv270
Sonicwall nsv470
Sonicwall nsv870
Sonicwall tz270
Sonicwall tz270w
Sonicwall tz280
Sonicwall tz370
Sonicwall tz370w
Sonicwall tz380
Sonicwall tz470
Sonicwall tz470w
Sonicwall tz480
Sonicwall tz570
Sonicwall tz570p
Sonicwall tz570w
Sonicwall tz580
Sonicwall tz670
Sonicwall tz680
Sonicwall tz80

Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Sonicwall
Sonicwall sonicos
Vendors & Products Sonicwall
Sonicwall sonicos

Tue, 24 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Description A post-authentication Out-of-bounds Read vulnerability in SonicOS allows a remote attacker to crash a firewall.
Weaknesses CWE-125
References

cve-icon MITRE

Status: PUBLISHED

Assigner: sonicwall

Published:

Updated: 2026-02-24T15:33:50.674Z

Reserved: 2025-12-02T06:28:47.831Z

Link: CVE-2026-0402

cve-icon Vulnrichment

Updated: 2026-02-24T15:33:37.729Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T15:21:37.410

Modified: 2026-02-26T20:59:57.220

Link: CVE-2026-0402

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:00:05Z

Weaknesses