SonicWall’s Security Blunders: Prehistoric Flaws Found in Modern Devices!
Cybersecurity firm watchTowr has discovered serious vulnerabilities in SonicWall’s SMA100 series. These flaws, likened to relics from a naive era of C programming, include buffer overflows and Cross-Site Scripting, threatening network security. Organizations are urged to patch immediately and enable multi-factor authentication to mitigate risks.

Hot Take:
Oh SonicWall, you’ve done it again! Just when we thought our VPN appliances were safe, watchTowr comes along and reveals they’re more vulnerable than a piñata at a kid’s birthday party. Who knew our network devices were stuck in a ’90s C programming time capsule? Time to patch things up, folks, before your system starts belting out nostalgic dial-up tones!
Key Points:
- watchTowr uncovered three critical vulnerabilities in SonicWall’s SMA100 series SSL-VPN appliances.
- The vulnerabilities include pre-authentication buffer overflows and a reflected Cross-Site Scripting (XSS) issue.
- Key vulnerabilities are CVE-2025-40596, CVE-2025-40597, and CVE-2025-40598.
- Organizations are advised to upgrade to firmware version 10.2.2.1-90sv or higher immediately.
- SonicWall recommends enabling multi-factor authentication (MFA) and activating the Web Application Firewall (WAF).
Already a member? Log in here