Impact
A flaw in the SonicWall Email Security appliance allows an attacker with administrative privileges to supply crafted input that bypasses input validation, resulting in corruption of the application database. The corruption impacts data integrity and can lead to service disruption or loss of critical email filtering capabilities. This issue is rooted in improper sanitization of input for administrative functions.
Affected Systems
The vulnerability affects SonicWall Email Security appliances, including the ESA5000, ESA5050, ESA7000, ESA7050, and ESA9000 product lines. No specific version information is provided, so all current releases of these models may be susceptible unless later mitigated by firmware updates.
Risk and Exploitability
The CVSS score of 3.8 classifies this vulnerability as moderate, and the EPSS score of less than 1% indicates a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires a remote authenticated attacker with administrative access and the ability to submit crafted input. While the exploitation conditions are restrictive, successful exploitation would corrupt the database, potentially impacting availability and data integrity. Monitoring for authentication and input anomalies is recommended because public exploitation evidence is currently unknown.
OpenCVE Enrichment