SonicWall has released a new set of security updates addressing multiple high-severity vulnerabilities that could allow attackers to crash devices, execute arbitrary code, or gain unauthorized file access.
The most critical issue impacts more than 30 SonicWall Gen7 and Gen8 firewalls, where a stack-based buffer overflow in the SonicOS SSL VPN service could be exploited remotely—without authentication—to trigger a denial-of-service (DoS) condition.
The flaw, tracked as CVE-2025-40601 with a CVSS score of 7.2, affects devices only when the SSLVPN interface or service is enabled.
SonicWall has fixed the issue in SonicOS 7.3.1-7013 and 8.0.2-8011. Gen6 firewalls and SMA 100/1000 appliances remain unaffected. Until patches are applied, customers are urged to restrict SSL VPN access to trusted IPs and block connections from untrusted sources.
In addition, SonicWall’s Email Security appliances received patches for two vulnerabilities:
1. CVE-2025-40604 (CVSS 7.2) – Root Filesystem Image Signature Not Verified
Failure to verify the signature of loaded root filesystem images could allow attackers to modify system files and execute arbitrary code on affected appliances.
2. CVE-2025-40605 (CVSS 4.9) – Path Traversal Vulnerability
A directory-traversal flaw that allows attackers to manipulate file paths using crafted sequences such as “../”, enabling access to restricted files and directories.
These issues have been fixed in Email Security version 10.0.34.8215, covering models 5000, 5050, 7000, 7050, 9000, VMWare, and Hyper-V deployments.
SonicWall stated that no active exploitation of these vulnerabilities has been observed so far. More details are available in the company’s official advisories.