Vulnerability Description
Use of Externally-Controlled Format String vulnerability in the SonicOS SSL VPN interface allows a remote unauthenticated attacker to cause service disruption.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sonicwall | Sonicos | >= 7.1.1-7040, < 7.3.0-7012 |
| Sonicwall | Nsa 2700 | - |
| Sonicwall | Nsa 3700 | - |
| Sonicwall | Nsa 4700 | - |
| Sonicwall | Nsa 5700 | - |
| Sonicwall | Nsa 6700 | - |
| Sonicwall | Nssp 10700 | - |
| Sonicwall | Nssp 11700 | - |
| Sonicwall | Nssp 13700 | - |
| Sonicwall | Nssp 15700 | - |
| Sonicwall | Nsv270 | - |
| Sonicwall | Nsv470 | - |
| Sonicwall | Nsv870 | - |
| Sonicwall | Tz270 | - |
| Sonicwall | Tz270W | - |
| Sonicwall | Tz370 | - |
| Sonicwall | Tz370W | - |
| Sonicwall | Tz470 | - |
| Sonicwall | Tz470W | - |
| Sonicwall | Tz570 | - |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2025-40600?
CVE-2025-40600 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Use of Externally-Controlled Format String vulnerability in the SonicOS SSL VPN interface allows a remote unauthenticated attacker to cause service disruption.
How severe is CVE-2025-40600?
CVE-2025-40600 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-40600?
Check the references section above for vendor advisories and patch information. Affected products include: Sonicwall Sonicos, Sonicwall Nsa 2700, Sonicwall Nsa 3700, Sonicwall Nsa 4700, Sonicwall Nsa 5700.