Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0400: CWE-134 Use of Externally-Controlled Format String in SonicWall SonicOS

0
Medium
VulnerabilityCVE-2026-0400cvecve-2026-0400cwe-134
Published: Tue Feb 24 2026 (02/24/2026, 14:54:15 UTC)
Source: CVE Database V5
Vendor/Project: SonicWall
Product: SonicOS

Description

A post-authentication Format String vulnerability in SonicOS allows a remote attacker to crash a firewall.

AI-Powered Analysis

AILast updated: 02/24/2026, 20:56:17 UTC

Technical Analysis

CVE-2026-0400 is a format string vulnerability classified under CWE-134 found in SonicWall's SonicOS firmware. The flaw exists in how SonicOS handles externally-controlled format strings after an attacker has authenticated to the device. Format string vulnerabilities occur when user-supplied input is improperly used as a format string parameter in functions like printf, potentially allowing attackers to manipulate memory or cause crashes. In this case, the vulnerability enables a remote attacker with valid credentials to send crafted input that causes the firewall to crash, resulting in a denial-of-service (DoS). The affected versions include SonicOS 7.0.1-5169 and older, 7.3.1-7013 and older, and 8.1.0-8017 and older. Exploitation requires authenticated access with high privileges, no user interaction is needed, and the attack vector is network-based. The CVSS v3.1 score is 4.9, reflecting a medium severity primarily due to the impact on availability without confidentiality or integrity compromise. No public exploits or active exploitation have been reported as of the publication date. The vulnerability highlights the importance of secure coding practices in handling format strings and the risks posed by post-authentication flaws in network security devices.

Potential Impact

The primary impact of CVE-2026-0400 is denial of service, where an attacker can crash SonicWall firewalls, causing network disruption and potential downtime. This can affect organizations relying on SonicWall devices for perimeter security, VPN access, and traffic filtering. The loss of firewall availability can expose internal networks to increased risk from other threats during downtime and disrupt business operations, especially for enterprises and service providers with critical uptime requirements. Since exploitation requires authenticated access, the risk is somewhat mitigated by strong access controls, but insider threats or compromised credentials could still lead to exploitation. The vulnerability does not allow data theft or modification, but the availability impact can indirectly affect confidentiality and integrity by disabling security controls. Organizations with large deployments of affected SonicOS versions may face operational challenges and increased incident response costs if exploited.

Mitigation Recommendations

Organizations should immediately inventory SonicWall devices to identify affected SonicOS versions and plan for timely firmware upgrades once patches are released by SonicWall. Until patches are available, restrict administrative access to trusted networks and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of credential compromise. Monitor firewall logs for unusual post-authentication activity that could indicate exploitation attempts. Implement network segmentation to limit access to management interfaces and consider deploying intrusion detection/prevention systems to detect anomalous traffic patterns. Regularly review and update firewall configurations to minimize attack surface. Engage with SonicWall support for guidance on interim mitigations or workarounds. Finally, maintain an incident response plan to quickly recover from potential denial-of-service events caused by exploitation of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
sonicwall
Date Reserved
2025-12-02T06:28:43.819Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699e0f3cbe58cf853b290cff

Added to database: 2/24/2026, 8:51:08 PM

Last enriched: 2/24/2026, 8:56:17 PM

Last updated: 2/24/2026, 11:24:17 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats