SonicWall has revealed a vulnerability in its SonicOS SSLVPN Virtual Office interface that could let remote attackers crash firewall appliances. Identified as CVE-2025-32818, this high-severity vulnerability has a CVSS score of 7.5, posing significant risks for enterprises using SonicWall Gen7 devices for secure network access.
The official advisory states that a Null Pointer Dereference vulnerability in the SonicOS SSLVPN Virtual Office interface lets a remote, unauthenticated attacker crash the firewall, which could cause a Denial-of-Service (DoS) situation.
By infosecbulletin
/ Thursday , April 24 2025
SonicWall has revealed a vulnerability in its SonicOS SSLVPN Virtual Office interface that could let remote attackers crash firewall appliances....
Read More
By infosecbulletin
/ Thursday , April 24 2025
GitLab has announced a security advisory urging users to upgrade their self-managed installations right away. Versions 17.11.1, 17.10.5, and 17.9.7...
Read More
By infosecbulletin
/ Wednesday , April 23 2025
Imdadul Haque, the president of Internet Service Provider of Bangladesh (ISPAB) said, I automatically got back my WhatsApp account. What...
Read More
By infosecbulletin
/ Wednesday , April 23 2025
Zyxel Networks has issued critical security patches for two high-severity vulnerabilities in its USG FLEX H series firewalls. These flaws...
Read More
By infosecbulletin
/ Wednesday , April 23 2025
South Korea's largest mobile operator, SK Telecom, is warning that a malware infection allowed threat actors to access sensitive USIM-related...
Read More
By infosecbulletin
/ Wednesday , April 23 2025
Security researcher Matt Keeley showed that artificial intelligence can now develop working exploits for critical vulnerabilities before public proof-of-concept (PoC)...
Read More
By infosecbulletin
/ Tuesday , April 22 2025
Several vulnerabilities have been found in TP-Link routers, exposing users to serious security risks from SQL injection flaws in their...
Read More
By infosecbulletin
/ Tuesday , April 22 2025
SSL.com has revealed a major security flaw in its domain validation system, which could enable attackers to acquire fake SSL...
Read More
By infosecbulletin
/ Tuesday , April 22 2025
Amazon has paused some data center lease negotiations for its cloud division, particularly in international markets, according to Wells Fargo...
Read More
By infosecbulletin
/ Monday , April 21 2025
ELUSIVE COMET is a threat actor conducting a sophisticated attack campaign that uses Zoom's remote control feature to access victims'...
Read More
This flaw allows attackers to take the firewall offline by sending specific requests to the SSLVPN interface, without needing authentication.
The vulnerability affects a wide range of SonicWall’s Gen7 virtual and physical firewalls, including:
Gen7 NSv: NSv 270, NSv 470, NSv 870
Gen7 Firewalls: TZ270, TZ270W, TZ370, TZ370W, TZ470, TZ470W, TZ570, TZ570W, TZ570P, TZ670
NSa Series: NSa 2700, 3700, 4700, 5700, 6700
NSsp Series: 10700, 11700, 13700, 15700
TZ80 (firmware 8.0.0-8037 and earlier)
Affected versions range from 7.1.1-7040 to 7.1.3-7015 (for 7.1.x releases) and 8.0.0-8037 and earlier for the TZ80.
SonicWall has quickly resolved this issue in recent firmware updates. Users should upgrade to:
Version 7.2.0-7015 or higher for Gen7 Firewalls and NSv
Version 8.0.1-8017 or higher for TZ80 devices
Enterprises are advised to implement these updates right away to reduce the risk of a DoS attack.
GitLab Releases Security Update For Multiple Vulns