Back

SonicWall SonicOS Vulnerabilities Enable Access Control Bypass and Firewall Crashes

Severity: High (Score: 63.8)

Sources: Cybersecuritynews, Gbhackers, Heise.De, psirt.global.sonicwall.com

Summary

SonicWall has issued a security advisory on April 29, 2026, regarding three vulnerabilities in its SonicOS software, identified under advisory ID SNWLID-2026-0004. These vulnerabilities allow attackers to bypass access controls, manipulate restricted files, and potentially crash firewall systems, leading to denial-of-service conditions. The most severe vulnerability has been assigned a high-severity score, indicating significant risk. The flaws were discovered by the Advanced Research Team at CrowdStrike. Administrators are advised to apply the latest firmware updates immediately to mitigate these risks. The vulnerabilities could impact various organizations relying on SonicWall firewalls for network security. Specific CVEs have not been disclosed in the articles. The advisory emphasizes the urgency of addressing these vulnerabilities to prevent exploitation. Key Points: • Three critical vulnerabilities in SonicWall's SonicOS allow access control bypass. • Attackers can manipulate restricted files and crash firewall systems. • Immediate firmware updates are recommended for affected systems.

Key Entities

  • DDoS (attack_type)
  • CrowdStrike (company)
  • Sonicwall (company)
  • CVE-2026-0204 (cve)
  • CVE-2026-0205 (cve)
  • CVE-2026-0206 (cve)
  • CWE-120 - Classic Buffer Overflow (cwe)
  • CWE-22 - Path Traversal (cwe)
  • CWE-287 - Improper Authentication (cwe)
  • SonicOS (platform)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed