SonicWall has revealed a vulnerability in its SonicOS SSLVPN Virtual Office interface that could let remote attackers crash firewall appliances. Identified as CVE-2025-32818, this high-severity vulnerability has a CVSS score of 7.5, posing significant risks for enterprises using SonicWall Gen7 devices for secure network access.
The official advisory states that a Null Pointer Dereference vulnerability in the SonicOS SSLVPN Virtual Office interface lets a remote, unauthenticated attacker crash the firewall, which could cause a Denial-of-Service (DoS) situation.
By infosecbulletin
/ Saturday , May 17 2025
A new class of vulnerabilities in Intel processors, called Branch Predictor Race Conditions (BPRC), enables attackers to extract sensitive data...
Read More
By infosecbulletin
/ Wednesday , May 14 2025
Siemens issued a security advisory (SSA-047424) for two serious vulnerabilities—CVE-2025-26389 and CVE-2025-26390—impacting the OZW672 and OZW772 web servers. These servers...
Read More
By infosecbulletin
/ Wednesday , May 14 2025
Microsoft has released its Patch Tuesday updates for May 2025, addressing a total of 78 vulnerabilities across its product ecosystem,...
Read More
By infosecbulletin
/ Tuesday , May 13 2025
NID services in Bangladesh are temporarily suspended due to issues with delivering One-Time Passwords (OTP) needed to access the NID...
Read More
By infosecbulletin
/ Monday , May 12 2025
Google will pay about $1.4 billion to Texas to settle two lawsuits regarding location tracking and biometric data storage without...
Read More
By infosecbulletin
/ Friday , May 9 2025
YouTube has restricted access to at least four Bangladeshi television channels in India following a takedown request from the Indian...
Read More
By infosecbulletin
/ Friday , May 9 2025
Microsoft has fixed critical vulnerabilities in its core cloud services, including Azure Automation, Azure Storage, Azure DevOps, and Microsoft Power...
Read More
By infosecbulletin
/ Thursday , May 8 2025
The cyber threat landscape is rapidly changing, with a notable increase in ransomware activity in April 2025, driven by the...
Read More
By infosecbulletin
/ Thursday , May 8 2025
SonicWall has released patches for three security flaws in SMA 100 Secure Mobile Access appliances that could allow remote code...
Read More
By infosecbulletin
/ Thursday , May 8 2025
From April 2024 to April 2025, Flashpoint analysts noted that the financial sector was a major target for threat actors,...
Read More
This flaw allows attackers to take the firewall offline by sending specific requests to the SSLVPN interface, without needing authentication.
The vulnerability affects a wide range of SonicWall’s Gen7 virtual and physical firewalls, including:
Gen7 NSv: NSv 270, NSv 470, NSv 870
Gen7 Firewalls: TZ270, TZ270W, TZ370, TZ370W, TZ470, TZ470W, TZ570, TZ570W, TZ570P, TZ670
NSa Series: NSa 2700, 3700, 4700, 5700, 6700
NSsp Series: 10700, 11700, 13700, 15700
TZ80 (firmware 8.0.0-8037 and earlier)
Affected versions range from 7.1.1-7040 to 7.1.3-7015 (for 7.1.x releases) and 8.0.0-8037 and earlier for the TZ80.
SonicWall has quickly resolved this issue in recent firmware updates. Users should upgrade to:
Version 7.2.0-7015 or higher for Gen7 Firewalls and NSv
Version 8.0.1-8017 or higher for TZ80 devices
Enterprises are advised to implement these updates right away to reduce the risk of a DoS attack.
GitLab Releases Security Update For Multiple Vulns