Impact
The identified vulnerability stems from inadequate input validation in the SonicWall Email Security appliance. An adversary who can authenticate as an administrator can exploit this weakness to force the application to cease responding, effectively degrading the service and potentially disrupting email flow for all users. The core weakness is characterized as CWE‑20, improper input validation, which directly leads to a denial‑of‑service condition.
Affected Systems
The flaw affects the SonicWall Email Security product line, including the ESA5000, ESA5050, ESA7000, ESA7050, and ESA9000 appliance models. No specific version numbers are listed in the data, meaning that any firmware iteration of these appliances that has not been patched may be vulnerable.
Risk and Exploitability
The CVSS score of 2.7 indicates a low severity, and the EPSS score below 1% reflects a low likelihood of exploitation. The vulnerability is not currently listed in the CISA KEV catalog. Exploitation requires a remote authenticated session as an administrator, which limits its reach but still presents a significant risk inside compromised environments where privileged credentials may exist.
OpenCVE Enrichment