Description
A post-authentication Stack-based Buffer Overflow vulnerability in SonicOS certificate handling allows a remote attacker to crash a firewall.
Published: 2026-03-04
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Immediate Patch
AI Analysis

Impact

A stack‑based buffer overflow occurs in SonicOS certificate handling when a user authenticates and processes a certificate. The flaw allows a remote attacker who can authenticate to a SonicWall firewall to send a specially crafted certificate that causes the device to crash, resulting in a denial of service. This weakness is a classic buffer overflow (CWE‑121).

Affected Systems

The vulnerability affects SonicWall devices running SonicOS firmware, specifically the NSA 2700, NSA 2800, NSA 3700, NSA 3800, NSA 4700, NSA 4800, NSA 5700, NSA 5800, NSA 6700 families and the NSSP 10700, 11700, 13700, 15700, NSV270, NSV470, NSV870, TZ270, TZ270W, TZ280, TZ370, TZ370W, TZ380, TZ470, TZ470W, TZ480, TZ570, TZ570P, TZ570W, TZ580, TZ670, TZ680, TZ80, and legacy SonicOS firmware devices. The exact firmware versions impacted are not listed in the data but all devices running the affected SonicOS versions are susceptible.

Risk and Exploitability

The CVSS score of 4.9 indicates a moderate impact with a low to medium likelihood of exploitation, reflected by an EPSS score of less than 1%. The flaw does not appear in the CISA KEV catalog, suggesting no widespread exploitation reports to date. However, the attacker must first authenticate to the device, implying that compromised or privileged credentials are needed. Once authenticated, the attacker can send a malformed certificate or trigger the buffer overflow during certificate processing, causing the firewall to crash and disrupt traffic.

Generated by OpenCVE AI on April 17, 2026 at 13:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest SonicOS firmware update that removes the buffer overflow bug
  • Restrict access to the certificate management interface to trusted administrators and enforce the principle of least privilege
  • Enable logging and alerting for unusual certificate operations or authentication events and investigate any anomalies promptly
  • If a patch is unavailable, isolate the affected firewall from core networks or disable certificate handling services until a fix is deployed

Generated by OpenCVE AI on April 17, 2026 at 13:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 13:30:00 +0000

Type Values Removed Values Added
Title SonicOS Certificate Handling Buffer Overflow Enables Firewall Crash

Thu, 05 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Sonicwall nsa 2700
Sonicwall nsa 2800
Sonicwall nsa 3700
Sonicwall nsa 3800
Sonicwall nsa 4700
Sonicwall nsa 4800
Sonicwall nsa 5700
Sonicwall nsa 5800
Sonicwall nsa 6700
Sonicwall nssp 10700
Sonicwall nssp 11700
Sonicwall nssp 13700
Sonicwall nssp 15700
Sonicwall nsv270
Sonicwall nsv470
Sonicwall nsv870
Sonicwall tz270
Sonicwall tz270w
Sonicwall tz280
Sonicwall tz370
Sonicwall tz370w
Sonicwall tz380
Sonicwall tz470
Sonicwall tz470w
Sonicwall tz480
Sonicwall tz570
Sonicwall tz570p
Sonicwall tz570w
Sonicwall tz580
Sonicwall tz670
Sonicwall tz680
Sonicwall tz80
CPEs cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_2800:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_3800:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_4800:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_5800:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz280:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz380:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz480:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz580:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz680:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:tz80:-:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*
Vendors & Products Sonicwall nsa 2700
Sonicwall nsa 2800
Sonicwall nsa 3700
Sonicwall nsa 3800
Sonicwall nsa 4700
Sonicwall nsa 4800
Sonicwall nsa 5700
Sonicwall nsa 5800
Sonicwall nsa 6700
Sonicwall nssp 10700
Sonicwall nssp 11700
Sonicwall nssp 13700
Sonicwall nssp 15700
Sonicwall nsv270
Sonicwall nsv470
Sonicwall nsv870
Sonicwall tz270
Sonicwall tz270w
Sonicwall tz280
Sonicwall tz370
Sonicwall tz370w
Sonicwall tz380
Sonicwall tz470
Sonicwall tz470w
Sonicwall tz480
Sonicwall tz570
Sonicwall tz570p
Sonicwall tz570w
Sonicwall tz580
Sonicwall tz670
Sonicwall tz680
Sonicwall tz80

Wed, 04 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Sonicwall
Sonicwall sonicos
Vendors & Products Sonicwall
Sonicwall sonicos

Wed, 04 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 09:30:00 +0000

Type Values Removed Values Added
Description A post-authentication Stack-based Buffer Overflow vulnerability in SonicOS certificate handling allows a remote attacker to crash a firewall.
Weaknesses CWE-121
References

cve-icon MITRE

Status: PUBLISHED

Assigner: sonicwall

Published:

Updated: 2026-03-04T16:05:54.854Z

Reserved: 2026-03-02T13:59:15.773Z

Link: CVE-2026-3439

cve-icon Vulnrichment

Updated: 2026-03-04T16:04:59.052Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-04T10:16:08.150

Modified: 2026-03-05T18:03:11.943

Link: CVE-2026-3439

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T13:15:19Z

Weaknesses