The user's description aligns closely with the reported details of these critical vulnerabilities affecting the web interface of SonicWall Secure Mobile Access (SMA) 100 series appliances, which provide SSL-VPN for remote access. These flaws enable unauthenticated attackers to trigger denial-of-service (DoS) conditions, potentially execute arbitrary code, or run malicious JavaScript. Discovered internally by SonicWall, patches were released on July 23, 2025, following routine security audits. While no confirmed in-the-wild exploitation has been reported as of July 24, 2025, the unauthenticated nature of the flaws has prompted warnings about likely active scanning by threat actors, as is common with newly disclosed remote access vulnerabilities. Organizations using SMA 100 series (e.g., 200, 210, 400, 410, 500v) are urged to patch immediately to mitigate risks of compromise.Key facts from reports:
Aspect | CVE-2025-40596 | CVE-2025-40597 | CVE-2025-40598 | Recommendations |
---|---|---|---|---|
Type | Stack-based buffer overflow | Heap-based buffer overflow | Reflected XSS | Scan networks for exposed SMA instances (e.g., via Shodan); prioritize internet-facing devices. |
CVSS Estimate | 8.1 (Critical) β DoS/RCE | 8.1 (Critical) β DoS/RCE | 1.2-6.3 (Low-Medium) β JS execution | Apply patches immediately; test in non-production first. |
Affected Versions | SMA 100 series < patched firmware | SMA 100 series < patched firmware | SMA 100 series < patched firmware | Monitor for IOCs like unusual web requests; use IDS/IPS rules for buffer overflow patterns. |
Exploitation | Unauth remote via crafted requests | Unauth remote via crafted requests | Unauth remote via malicious links | If unpatched, firewall the web interface; enable logging and alerts. |
Impact | System crash or code exec | System crash or code exec | Phishing, session theft | Rotate credentials post-patch; conduct vulnerability assessments. |
This incident follows a pattern of vulnerabilities in SonicWall SMA products, with prior chains leading to RCE in older versions. No addition to CISA's KEV catalog yet, but monitoring is advised. For detailed patch notes or PoC analysis (none public yet), refer to SonicWall's PSIRT resources