A Server-Side Request Forgery vulnerability in the SonicOS SSH management interface allows a remote attacker to establish a TCP connection to an IP address on any port when the user is logged in to the firewall.
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003
https://www.securityweek.com/sonicwall-patches-authentication-bypass-vulnerabilities-in-firewalls/
https://www.bleepingcomputer.com/news/security/sonicwall-urges-admins-to-patch-exploitable-sslvpn-bug-immediately/
Source: Mitre, NVD
Published: 2025-01-09
Updated: 2025-01-09
Base Score: 6.4
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N
Severity: Medium
Base Score: 7.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Severity: High
EPSS: 0.00033