Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
4.9
SonicOS Management Interface Can Be Crashed by Malicious Input
CVE-2026-0399
Summary
The SonicOS management interface has a security weakness that could allow an attacker to cause the system to crash or behave unexpectedly if they send a specially crafted input to the affected API endpoint. This could happen after a user has already logged in to the system. To protect your SonicOS system, consider applying updates or patches as soon as possible.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| sonicwall | sonicos | <= 7.3.2-7010 | – |
| sonicwall | sonicos | <= 8.2.0-8009 | – |
Original title
Multiple post-authentication stack-based buffer overflow vulnerabilities in the SonicOS management interface due to improper bounds checking in a API endpoint.
Original description
Multiple post-authentication stack-based buffer overflow vulnerabilities in the SonicOS management interface due to improper bounds checking in a API endpoint.
nvd CVSS3.1
4.9
Vulnerability type
CWE-121
Stack-based Buffer Overflow
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2026-0001 Vendor Advisory
Published: 24 Feb 2026 · Updated: 14 Mar 2026 · First seen: 6 Mar 2026