Description
A vulnerability exists in the SonicWall Email Security appliance due to improper input sanitization that may lead to data corruption, allowing a remote authenticated attacker as admin user could exploit this issue by providing crafted input that corrupts application database.
Published: 2026-03-31
Score: 3.8 Low
EPSS: < 1% Very Low
KEV: No
Impact: Data Corruption
Action: Patch
AI Analysis

Impact

A flaw in the SonicWall Email Security appliance allows an attacker with administrative privileges to supply crafted input that bypasses input validation, resulting in corruption of the application database. The corruption impacts data integrity and can lead to service disruption or loss of critical email filtering capabilities. This issue is rooted in improper sanitization of input for administrative functions.

Affected Systems

The vulnerability affects SonicWall Email Security appliances, including the ESA5000, ESA5050, ESA7000, ESA7050, and ESA9000 product lines. No specific version information is provided, so all current releases of these models may be susceptible unless later mitigated by firmware updates.

Risk and Exploitability

The CVSS score of 3.8 classifies this vulnerability as moderate, and the EPSS score of less than 1% indicates a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires a remote authenticated attacker with administrative access and the ability to submit crafted input. While the exploitation conditions are restrictive, successful exploitation would corrupt the database, potentially impacting availability and data integrity. Monitoring for authentication and input anomalies is recommended because public exploitation evidence is currently unknown.

Generated by OpenCVE AI on April 13, 2026 at 16:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and apply any available firmware or software patches from SonicWall for the Email Security appliance.
  • If no patch is available, restrict administrative access to trusted users and monitor for suspicious input activity.
  • Change administrator credentials and limit administrative privileges to reduce the attack surface.
  • Contact SonicWall support for guidance and to report any ongoing exploitation attempts.

Generated by OpenCVE AI on April 13, 2026 at 16:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Title Improper Input Sanitization in SonicWall Email Security Enables Data Corruption

Mon, 13 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Sonicwall esa5000
Sonicwall esa5050
Sonicwall esa7000
Sonicwall esa7050
Sonicwall esa9000
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:sonicwall:email_security:*:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:esa5000:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:esa5050:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:esa7000:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:esa7050:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:esa9000:-:*:*:*:*:*:*:*
Vendors & Products Sonicwall esa5000
Sonicwall esa5050
Sonicwall esa7000
Sonicwall esa7050
Sonicwall esa9000

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Sonicwall
Sonicwall email Security
Vendors & Products Sonicwall
Sonicwall email Security

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description A vulnerability exists in the SonicWall Email Security appliance due to improper input sanitization that may lead to data corruption, allowing a remote authenticated attacker as admin user could exploit this issue by providing crafted input that corrupts application database.
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 3.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Sonicwall Email Security Esa5000 Esa5050 Esa7000 Esa7050 Esa9000
cve-icon MITRE

Status: PUBLISHED

Assigner: sonicwall

Published:

Updated: 2026-03-31T20:34:15.574Z

Reserved: 2026-03-03T10:00:16.245Z

Link: CVE-2026-3470

cve-icon Vulnrichment

Updated: 2026-03-31T20:34:08.852Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T21:16:33.363

Modified: 2026-04-13T15:26:04.477

Link: CVE-2026-3470

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:42:17Z

Weaknesses