Impact
This vulnerability is a post-authentication out-of-bounds read in the SonicOS operating system. The flaw allows an authenticated user with sufficient privileges to trigger a memory read beyond valid bounds, which can cause the firewall process to crash. The impact is a denial of service that could interrupt network traffic and potentially disrupt business operations. The weakness is classified as CWE-125, indicating that the code does not properly check array bounds before accessing memory.
Affected Systems
Affected vendors and products include SonicWall SonicOS devices such as the NSA 2700, 2800, 3700, 3800, 4700, 4800, 5700, 5800, 6700 series, NSSP 10700, 11700, 13700, 15700, and NSV 270, 470, 870; TZ 270, 270w, 280, 370, 370w, 380, 470, 470w, 480, 570, 570p, 570w, 580, 670, 680, 80 series routers and switches, as well as all SonicOS firmware releases. The vendor list is derived from the CPE entries, and specific version details are not disclosed in the input.
Risk and Exploitability
The CVSS score of 4.9 indicates moderate severity, and an EPSS score of 0.00216 indicates an extremely low likelihood of exploitation in the wild at this time. The vulnerability is not listed in the CISA KEV catalog, implying no known active exploits targeting it. Attackers would first need to authenticate to the device, likely using compromised credentials or exploiting other local entry points, and then execute a crafted request that triggers the out-of-bounds read, leading to a service outage. Without an exploit code or widespread exposure, the risk remains primarily a local or privileged threat that can be mitigated by updating firmware and hardening access controls.
OpenCVE Enrichment