SonicWall SOS: Fixes Released for High-Severity Vulnerabilities in Firewalls and Email Security!

SonicWall has released urgent fixes for high-severity vulnerabilities affecting over 30 firewalls. A stack-based buffer overflow bug in SonicOS SSL VPN service could let attackers remotely crash devices or execute arbitrary files. Update to SonicOS versions 7.3.1-7013 or 8.0.2-8011 to keep those pesky cyber pests at bay.

Pro Dashboard

Hot Take:

SonicWall’s firewalls are having a meltdown, literally! This week, SonicWall decided to play firefighter, rolling out fixes for vulnerabilities that could otherwise let hackers crash their firewalls like a bad Windows update. It’s like SonicWall is saying, “Sure, our firewalls might have more holes than Swiss cheese, but at least we’re patching them!”

Key Points:

  • Over 30 SonicWall Gen7 and Gen8 firewalls are vulnerable to a stack-based buffer overflow bug.
  • The vulnerability, CVE-2025-40601, has a CVSS score of 7.2 and affects devices with the SonicOS SSL VPN service enabled.
  • Patches have been released in SonicOS versions 7.3.1-7013 and 8.0.2-8011.
  • SonicWall’s Email Security appliances got fixes for two vulnerabilities, one allowing arbitrary code execution.
  • No current evidence of these vulnerabilities being exploited in the wild, says SonicWall.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?