UPCOMING SLIVER WORKSHOP: Getting Started & 1.6 Features Learn More

SonicWall Sonicos Versions 7.1.x and 8.0.x

Advisory Sonic OS SSL VPN DOS 2025 32818 with Bishop Fox branding.

Share

This document describes a vulnerability identified by Bishop Fox staff in SonicWall SonicOS 7.1.x and 8.0.x.

Product Vendor

SonicWall

Product Description

SonicOS is the operating system that runs on SonicWall next-generation firewalls. The vendor’s official website is https://www.sonicwall.com/products/firewalls. The latest versions of the operating system are 7.2.0-7015 and 8.0.1-8017, released on April 23, 2025.

Vulnerabilities List

Bishop Fox identified a denial-of-service vulnerability in the SonicOS SSL VPN interface. This vulnerability is described in the following sections.

Affected Versions

Versions 7.1.2-7019, 7.1.3-7015, 8.0.0-8035, and 8.0.0-8037

Summary of Findings

Bishop Fox staff identified a vulnerability in SonicWall SonicOS 7.1.x and 8.0.x that allowed them to cause an affected NSv virtual appliance to reboot by sending unauthenticated requests to specific API endpoints, resulting in a denial-of-service condition. The vulnerability is present in the SSL VPN service, which is typically exposed to the internet by SonicWall customers who use this feature.

Impact

By repeating the attack, an attacker can cause an affected firewall to crash and reboot whenever a user connects to the SSL VPN, thereby preventing use of the SSL VPN service.

Solution

Update to version 7.2.0 or 8.0.1 or disable the SSL VPN service.

Denial of service

Denial of service (DoS) occurs when an attacker prevents authorized users from accessing a resource. This type of attack arises in three ways. First, it can occur when the transmission medium is disrupted between the user and the resource, leaving no path for communication. Second, the target system may be coaxed to reset, often repeatedly, which forces any established connections to reset as well. Third, the target resource may be fooled into consuming all available computing resources, thereby leaving no available resources to handle legitimate requests.

Vulnerability Details

CVE ID: CVE-2025-32818

Vulnerability Type: Null pointer dereference

Access Vector: ​☒​ Remote, ​☐​ Local, ​☐​ Physical, ​☐​ Context dependent, ​☐​ Other (if other, please specify)

Impact: ​☐​ Code execution, ​☒​ Denial of service, ​☐​ Escalation of privileges, ​☐​ Information disclosure, ​☐​ Other (if other, please specify)

Security Risk: ​☐​ Critical, ​☒​ High, ​☐​ Medium, ​☐​ Low

Vulnerability: CWE-703: Improper Check or Handling of Exceptional Conditions

Bishop Fox staff found that the SSL VPN web servers in SonicOS 7.1.x and 8.0.x are vulnerable to a remote, unauthenticated denial of service via an HTTP POST request to two URIs that are typically exposed to the internet on devices where the SSL VPN feature is in use.

If there is at least one active SSL VPN session, sending a specially crafted request to either endpoint will cause a segmentation fault (when the software attempts to access an invalid memory address) in the sonicosv process. The root cause is a null pointer dereference in a strncmp function.

The segmentation fault causes the appliance to reboot, making the service unavailable for several minutes. An attacker could cause a lengthier outage by sending the same request every few minutes. 

Bishop Fox staff validated the vulnerability against SonicOS 7.1.2-7019 and 7.1.3-7015 running on a virtual SonicWall NSv appliance. SonicWall confirmed that physical appliances running these SonicOS versions, as well as 8.0.0-8035 and 8.0.0-8037, are similarly vulnerable.

Credits

Timeline

  • 01/16/2025: Initial discovery
  • 01/24/2025: Submitted report to vendor
  • 01/27/2025: Exchanged clarifying information
  • 01/28/2025: Vendor assigned PSIRT ID
  • 02/10/2025: Vendor confirmed submission validity
  • 04/15/2025: Requested status update
  • 04/16/2025: Vendor assigned CVE-2025-32818 and CVSS severity 6.5
  • 04/17/2025: Requested re-evaluation of severity score
  • 04/21/2025: Vendor assigned CVSS severity 7.5
  • 04/23/2025: Vendor released updates and published advisory

Subscribe to our blog and advisories

Be first to learn about latest tools, advisories, and findings.


Jon Williams

About the author, Jon Williams

Senior Security Engineer

As a researcher for the Bishop Fox Capability Development team, Jon spends his time hunting for vulnerabilities and writing exploits for software on our customers' attack surface. He previously served as an organizer for BSides Connecticut for four years and most recently completed the Corelan Advanced Windows Exploit Development course. Jon has presented talks and written articles about his security research on various subjects, including enterprise wireless network attacks, bypassing network access controls, and malware reverse engineering.

More by Jon

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.