CVE-2024-40766
Published Aug 23, 2024
Last updated a year ago
AI description
CVE-2024-40766 is an improper access control vulnerability found in SonicWall SonicOS. The vulnerability lies in the SonicOS management access, potentially leading to unauthorized resource access. In specific conditions, this can cause the firewall to crash. The vulnerability affects SonicWall Firewall Gen 5 and Gen 6 devices, as well as Gen 7 devices running SonicOS 7.0.1-5035 and older versions. It is recommended to restrict firewall management access to trusted sources and ensure that firewall WAN management is not accessible from the public internet. Similarly, limiting SSLVPN access to trusted sources or disabling it from the internet is also advised.
- Description
- An improper access control vulnerability has been identified in the SonicWall SonicOS management access, potentially leading to unauthorized resource access and in specific conditions, causing the firewall to crash. This issue affects SonicWall Firewall Gen 5 and Gen 6 devices, as well as Gen 7 devices running SonicOS 7.0.1-5035 and older versions.
- Source
- PSIRT@sonicwall.com
- NVD status
- Analyzed
- Products
- sonicos
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Data from CISA
- Vulnerability name
- SonicWall SonicOS Improper Access Control Vulnerability
- Exploit added on
- Sep 9, 2024
- Exploit action due
- Sep 30, 2024
- Required action
- Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
- nvd@nist.gov
- NVD-CWE-noinfo
- PSIRT@sonicwall.com
- CWE-284
- Hype score
- Not currently trending
Zero-day vulnerabilities lurk in popular software, unseen until exploited. Attacks like Stuxnet, Log4Shell, and CVE-2024-40766 reveal their devastating impact. Defending against them demands a strong defense-in-depth strategy to detect, contain, and recover. https://t.co/65KxYPjK
@The4n6Analyst
24 Sept 2025
35 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Akira ransomware explota fallas en SonicWall SSL VPN y errores de configuración para acceder a redes corporativas. 🔓 CVE-2024-40766 + LDAP mal configurado = acceso no autorizado. 🔗https://t.co/VIhrxxRAwA #Ransomware #Akira #SonicWall #CyberSecurity #VPN #ThreatIntel #
@trustlock_sec
19 Sept 2025
17 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
The #Akira ransomware group is back in action, exploiting a critical vulnerability (CVE-2024-40766) in SonicWall SSL VPN devices that was previously patched in August 2023. Affected #SonicWall versions include Gen 5, Gen 6, and Gen 7. https://t.co/djFwL9lzmp
@devcentral
19 Sept 2025
48 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 BREAKING SONICWALL : Violation MySonicWall expose configurations de 5% des pare-feu mondiaux ! Attaques brute-force API + CVE-2024-40766 = tempête parfaite cybercriminelle. https://t.co/tuprLhtm4C #SonicWall #MySonicWall #DataBreach #CyberSecurity #FirewallSecurity http
@ctrlaltnod
18 Sept 2025
2 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Researchers and authorities are warning that Akira ransomware attacks involving exploits of a year-old vulnerability affecting SonicWall firewalls are on the rise. A burst of about 40 attacks linked to CVE-2024-40766 hit SonicWall firewalls between mid-July and early August. ht
@CyberScoopNews
16 Sept 2025
445 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
Researchers and authorities are warning that Akira ransomware attacks involving exploits of a year-old vulnerability affecting SonicWall firewalls are on the rise. A burst of about 40 attacks linked to CVE-2024-40766 hit SonicWall firewalls between mid-July and early August. ht
@CyberScoopNews
15 Sept 2025
353 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
This is your Monday reminder to immediately apply patches if you are using SonicWall firewalls. The Akira ransomware group is actively attacking SonicWall firewalls by exploiting a known, year-old vulnerability (CVE-2024-40766: https://t.co/FqaWEywjKU
@CybelAngel
15 Sept 2025
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Researchers and authorities are warning that Akira ransomware attacks involving exploits of a year-old vulnerability affecting SonicWall firewalls are on the rise. A burst of about 40 attacks linked to CVE-2024-40766 hit SonicWall firewalls between mid-July and early August. ht
@CyberScoopNews
14 Sept 2025
491 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Top 5 Trending CVEs: 1 - CVE-2024-40766 2 - CVE-2025-54135 3 - CVE-2018-20587 4 - CVE-2022-46689 5 - CVE-2025-32756 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
14 Sept 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical Threat Alert: The SonicWall SSL VPN vulnerability (CVE-2024-40766) is being actively exploited by Akira Ransomware. Our guide provides the full threat intel and defense strategies. Read the full report: https://t.co/ks145AMJKc https://t.co/btW5RtlZco
@Iambivash007
13 Sept 2025
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
HybridPetya ransomware exploits CVE-2024-7344 to bypass UEFI Secure Boot. Akira targets SonicWall SSLVPN with CVE-2024-40766. Panama Ministry breached amid widespread patches for DELMIA, Cisco IOS XR, Samsung, Adobe. #Panama #UEFESecurity #SonicWall https://t.co/LEB3rIOUoE
@TweetThreatNews
13 Sept 2025
445 Impressions
0 Retweets
2 Likes
1 Bookmark
0 Replies
0 Quotes
Akira ransomware affiliates continue exploiting CVE-2024-40766 in SonicWall firewalls, targeting organizations globally through misconfigurations and outdated software amid firewall migrations. #SonicWall #Ransomware #USA https://t.co/1mj0j79foI
@TweetThreatNews
12 Sept 2025
174 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
📝 𝐒𝐨𝐧𝐢𝐜𝐖𝐚𝐥𝐥 𝐟𝐢𝐫𝐞𝐰𝐚𝐥𝐥𝐬 𝐭𝐚𝐫𝐠𝐞𝐭𝐞𝐝 𝐛𝐲 𝐟𝐫𝐞𝐬𝐡 𝐀𝐤𝐢𝐫𝐚 𝐫𝐚𝐧𝐬𝐨𝐦𝐰𝐚𝐫𝐞 𝐬𝐮𝐫𝐠𝐞 • Akira ransomware attacks exploiting SonicWall fir
@PurpleOps_io
12 Sept 2025
103 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Akira ransomware exploits three SonicWall flaws—including CVE-2024-40766 and SSLVPN misconfigs—to breach networks fast. Patch, enable MFA, and restrict access now. 🔐⚠️ #AkiraRansomware #Vulnerability https://t.co/pQZMaIqLtf
@manuelbissey
12 Sept 2025
101 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
一世を風靡したFirewallのSonicwallのVPN脆弱性がRansomwareの餌食になる CVE-2024-40766脆弱性問題が未解決で起こる乗っ取り。かって強固で知られたファイヤーウォールの名門ですが、最近は元気ないのでしょうか? http
@innovative_ec
12 Sept 2025
10 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Researchers warn that the Akira ransomware group exploits a year-old SonicWall flaw (CVE-2024-40766) using multiple vectors for access, urging users to secure accounts and apply patches to prevent unauthorized access. #CyberSecurity #Ransomware https://t.co/Hu71kxBimU
@Cyber_O51NT
12 Sept 2025
556 Impressions
0 Retweets
5 Likes
0 Bookmarks
2 Replies
0 Quotes
CVE-2024-40766 Detail https://t.co/DOmw14fxGn
@chasster123
11 Sept 2025
57 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers. Attacks exploit a year-old security flaw (CVE-2024-40766, CVSS score: 9.3) where local user passwords were carried over during the migration and not reset. https://t.co/xEOW0mJnDx https:/
@riskigy
11 Sept 2025
74 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Since late July 2025, Akira hackers have targeted SonicWall firewalls, exploiting a year-old vulnerability (CVE-2024-40766) alongside misconfigurations. Don't let complacency be your downfall! 🔒 #ThreatHunting
@Cyb3r_5wift
11 Sept 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Akira ransomware is exploiting a critical, year-old SonicWall SSLVPN bug (CVE-2024-40766) for unauthorized access. Patch now! 🚨 https://t.co/nFPi2p3dHD #AkiraRansomware #SonicWall #CVE202440766
@0xT3chn0m4nc3r
11 Sept 2025
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Akira ransomware exploiting critical SonicWall SSLVPN bug again The Akira ransomware gang is actively exploiting CVE-2024-40766, a year-old critical-severity access co… https://t.co/yUvGA9oWMq https://t.co/cPgS1fruUf
@DConsultinguk
11 Sept 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Urgent Warning! The ACSC is warning that a critical SonicWall vulnerability (CVE-2024-40766) is being actively exploited. Our exclusive report has the full analysis. #SonicWall #Cybersecurity #CVE https://t.co/5cukKLOw1q https://t.co/wBHdzn2vxs
@Iambivash007
11 Sept 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Vulnerability Alert: Akira ransomware is exploiting SonicWall SSL VPNs via CVE-2024-40766 (CVSS 9.3), LDAP misconfigs, and exposed portals. Initial access = RCE, data theft, ransomware. Mitigate: • Rotate local creds • Enforce MFA • Restrict access https://t.co/1VYrFOfO6n
@CloneSystemsInc
11 Sept 2025
67 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Срочное предупреждение! В Австралии выявлена уязвимость CVE-2024-40766, затрагивающая устройства SonicWall SSL VPN. Хакеры используют этот недостаток для несанкцион
@cybereye_ru
11 Sept 2025
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔒 Did you know CVE-2024-40766 has a staggering CVSS score of 9.8? 🚨 Akira ransomware is targeting SonicWall devices, exploiting potential zero-day vulnerabilities! #Cybersecurity #Ransomware https://t.co/XsUW0OxMvd
@Cyb3r_5wift
11 Sept 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Australia’s Cyber Security Centre alerts on active exploitation of CVE-2024-40766 in SonicWall SSL VPN devices, enabling Akira ransomware to bypass controls and crash firewalls. Firmware updates and credential resets critical. #SonicWallVPN #RansomwareAt… https://t.co/G5juQiB
@TweetThreatNews
11 Sept 2025
144 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
🚨 Akira ransomware is back — hammering SonicWall VPNs through a year-old flaw (CVE-2024-40766, CVSS 9.3). One misstep in SonicWall’s LDAP “Default User Group” can hand attackers VPN + admin access the moment they steal a password. Akira has already hit 967 victims an
@TheHackersNews
11 Sept 2025
77187 Impressions
56 Retweets
150 Likes
26 Bookmarks
0 Replies
2 Quotes
Ongoing active exploitation of SonicWall SSL VPNs in Australia (CVE-2024-40766) https://t.co/XqExgv8Fd6
@Dinosn
10 Sept 2025
1722 Impressions
2 Retweets
4 Likes
0 Bookmarks
0 Replies
0 Quotes
Undisclosed SonicWall Zero Day Leading to Akira Ransomware https://t.co/5C3rieuDIu SonicWall has linked recent SSLVPN security incidents to CVE-2024-40766, affecting Gen 7 and newer firewalls, with less than 40 identified incidents primarily during Gen 6 to Gen 7 migrations wh
@f1tym1
15 Aug 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
https://t.co/PTt8waIIpy SonicWall confirms recent SSL-VPN incidents on Gen 7+ firewalls aren’t caused by a zero-day, but tied to the known CVE-2024-40766. Most cases involved Gen 6 → Gen 7 password reuse without resets. #SonicWall #VulnerabilityManagement
@AnomalousBytes
11 Aug 2025
34 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-40766
@transilienceai
10 Aug 2025
29 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
#VeilleCyber : 📱 #Bouygues : 6,4M clients exposés (IBAN, coordonnées) 🖥️ Millions de PC #Dell vulnérables aux backdoors #ReVault ✈️ #AirFranceKLM : fuite CRM par #ShinyHunters 🔐 #SonicWall : attaques sur CVE-2024-40766 Détails et conseils 👇 https://t.co/PNV
@VeilleCyber_fr
10 Aug 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall has dismissed zero-day vulnerability fears after investigating recent ransomware attacks, confirming they stem from the known flaw CVE-2024-40766, urging users to update firmware and reset passwords for improved security. #Cybersecurity #Ransom… https://t.co/kCZQAMfKd
@Cyber_O51NT
9 Aug 2025
264 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall says that recent Akira ransomware attacks exploiting Gen 7 firewalls with SSLVPN enabled are exploiting an older vulnerability rather than a zero-day flaw. The company says that the attackers are targeting CVE-2024-40766, fixed in August 2024. https://t.co/OiXMymOkGF ht
@riskigy
8 Aug 2025
57 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#sonicwall says recent Gen 7 firewall hacks were not a zero-day but exploited CVE-2024-40766, tied to reused legacy passwords during migrations. Fewer than 40 confirmed cases, with Akira ransomware deployed. Users urged to update and reset credentials. https://t.co/eVP2kVNdhC
@Prevent_Cyber
8 Aug 2025
65 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall confirms no zero-day vulnerabilities are being exploited despite reports of targeted ransomware attacks linked to CVE-2024-40766. Weak password management during device migration facilitated the breaches. #CyberDefense #Ransomware #Japan https://t.co/rT85TfKOaX
@TweetThreatNews
7 Aug 2025
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#SonicWall updated its advisory on the recent campaign against its firewalls, claiming the incidents are likely tied to the exploitation of CVE-2024-40766 and not a new bug They are investigating about 40 incidents https://t.co/R9A2sCHPhj
@jgreigj
7 Aug 2025
49 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 SonicWall Vulnerability Exploited in August Akira Campaign Recent Akira ransomware intrusions have been linked to CVE-2024-40766, a previously disclosed vulnerability affecting SonicWall firewall appliances. Initial reporting suggested the possibility of a zero-day https://
@mox_five
7 Aug 2025
76 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall confirmed that recent attacks on its Gen 7 firewalls with SSL VPN are linked to CVE-2024-40766, a patched vulnerability (CVSS score: 9.3) related to improper access control. https://t.co/MgAdr2D927
@securityRSS
7 Aug 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📌 سونيك وول أكدت أن الهجمات الأخيرة على جدران الحماية من الجيل السابع وما فوق المتعلقة بـ SSL VPN ناتجة عن ثغرة قديمة تم تصحيحها وإعادة استخدام كلمات المرور
@Cybercachear
7 Aug 2025
41 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Attackers are hitting SonicWall firewalls again—but it’s not a new zero-day. Turns out, they’re exploiting a known bug (CVE-2024-40766) and weak password hygiene. Migrating from Gen 6 to Gen 7 without resets? That’s leaving doors wide open. Fu... https://t.co/zf
@IT_news_for_all
7 Aug 2025
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Attackers are hitting SonicWall firewalls again—but it’s not a new zero-day. Turns out, they’re exploiting a known bug (CVE-2024-40766) and weak password hygiene. Migrating from Gen 6 to Gen 7 without resets? That’s leaving doors wide open. Full details + what to
@TheHackersNews
7 Aug 2025
10636 Impressions
24 Retweets
60 Likes
12 Bookmarks
1 Reply
1 Quote
🚨 Attackers are hitting SonicWall firewalls again—but it’s not a new zero-day. Turns out, they’re exploiting a known bug (CVE-2024-40766) and weak password hygiene. Migrating from Gen 6 to Gen 7 without resets? That’s leaving doors wide open. Full... https://t.co/gC
@IT_news_for_all
7 Aug 2025
39 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
موجة هجمات فدية جديدة تستهدف SonicWall، وتكشف التقارير استغلال محتمل لثغرة يوم صفر في SonicOS لتوزيع برمجية Akira. -الهجمات طالت أجهزة محدثة وتستخدم MFA - الهجمات بد
@cyberscastx
4 Aug 2025
1761 Impressions
2 Retweets
10 Likes
2 Bookmarks
3 Replies
0 Quotes
🚨 Ransomware on the Rise! December 2024 saw a record-breaking 621 victims of ransomware attacks. New groups like FunkSec & SafePay are gaining momentum, while old players like Akira exploit vulnerabilities like CVE-2024-40766. Protect your organization NOW! 🛡️ https://t.co
@QnATech
16 Jan 2025
66 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
#Malware #Vulnerability Thousands of SonicWall Devices Remain Vulnerable to CVE-2024-40766 https://t.co/UtKzhVf5rC
@Komodosec
9 Jan 2025
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Threat Alert: SonicWall Issues Important Security Advisory for Multiple Vulnerabilities in Son CVE-2024-40766 Severity: ⚠️ Critical Maturity: 💥 Mainstream Learn more: https://t.co/rOv4wJ1kn7 #CyberSecurity #ThreatIntel #InfoSec (1/3)
@fletch_ai
9 Jan 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Over 48,000 SonicWall devices remain vulnerable to a critical security flaw, exposing organizations worldwide to ransomware attacks. The vulnerability, identified as CVE-2024-40766, was first disclosed in September 2024. #Ransomware #CyberSecurityAwareness #MalwareAlert #Hack ht
@techaniruddh
7 Jan 2025
157 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Additional Evidence of SonicWall CVE-2024-40766 Exploitation by Akira and Fog, and Patch Progress - Security Research Center Blog #vuln #akira #fog https://t.co/FtRYB1tfHH
@johntheMAT
27 Dec 2024
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Additional Evidence of SonicWall CVE-2024-40766 Exploitation by Akira and Fog, and Patch Progress - Security Research Center Blog https://t.co/fxXQ8bC5lZ
@anemone_fish
27 Dec 2024
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "37E20C47-F8DA-4313-B9AD-C63CEA9D42C5",
"versionEndExcluding": "5.9.2.14-13o"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:soho:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "C6B6B3FD-428E-4D6C-8C45-172CF4FB430D"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0B16D102-B2BA-4F94-A42F-B8EB2E697907",
"versionEndExcluding": "6.5.2.8-2n"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:nssp_12400:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "F2F22AB1-044C-45F1-BD33-82BB46402363"
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_12800:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "E62EAD79-2CD4-4479-B26A-A0C97B5B241A"
},
{
"criteria": "cpe:2.3:h:sonicwall:sm9800:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "FCBF16D6-4C60-440D-95AB-986ABC4F9100"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CAFD6E22-8E19-4B5A-85DE-7850FE0AE7CF",
"versionEndExcluding": "6.5.4.15.116n"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "B7BCDFEE-DC5A-44B8-85DF-8BFC02B1A973"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_3600:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "8A24BCC0-CE41-49AF-B03D-D4FCB422503B"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "043858A6-26AC-4EB0-A240-A43AD08C6AD5"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_4600:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "8FD73880-DC60-467F-99B6-69807D58A840"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "73BB9452-A014-4A68-9662-63E6C60EEAD2"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_5600:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "B0CF683A-7E83-464B-8A0D-4CC641377FA6"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9FAAEBB4-F180-4195-BA7F-591AB02EEDC9"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_6600:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "CD9C3F77-2F1A-4C4F-A8F8-CDBFB7B87891"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "676B05B2-716E-4DC4-BEE8-0E3BCCA5DB27"
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9200:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "FEF2B435-957C-4BBE-937D-23E4F33189EF"
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9250:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "0CE4FE75-10AD-47D4-AF87-E4C294F89EA8"
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9400:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "B485C543-DFCF-4481-92B4-F7198EE4FBD1"
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9450:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "928C1C0D-7AF7-4076-B5B2-207DFF3AD6A4"
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9600:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "F030C5AB-36CA-445E-AC87-8DEE18DBB40E"
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9650:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A1F9D940-8AE2-4B92-B69D-9FF6F48DF16C"
},
{
"criteria": "cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9FDE64E9-44DD-4B7C-BA34-FE2C79E3FAED"
},
{
"criteria": "cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4E8F3935-89B4-4091-9B8C-442C02FD4F3A"
},
{
"criteria": "cpe:2.3:h:sonicwall:sohow:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "7268E89B-FF46-45AD-82FF-333505EF957B"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_300:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "0804FADE-57F7-452F-86B3-079701059D37"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_300p:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9956F726-6D62-4616-B60A-4D3DD6F32105"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_300w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "29F4D403-F20A-4802-AAE9-9582486EB436"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_350:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "675F28A7-0BB3-4CDA-855E-7EFC650B512E"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_350w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "FF991212-3F2C-4F54-B96C-C33F500DB77B"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_400:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "5983C650-84F6-4B2E-A27E-9E83EA1DDC02"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_400w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "BDD4B412-7967-477F-929E-8F12A39186FF"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_500:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A1D996FA-52D1-47C2-87E6-682EEC9CA532"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_500w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "B9DEF6EE-000D-407D-AA2B-E039BA306A2A"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_600:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "C0B8BFA4-2E15-4318-B7A9-DBDE801D0CF0"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_600p:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "DCB8CDE6-8052-40F7-950F-05329499A58A"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "34814AB8-5F1D-44B4-B53B-FC4FA794DDAA",
"versionEndIncluding": "7.0.1-5035"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "8D8B0C7A-FD65-47CA-A625-150A90EFA7A1"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A69E000B-5806-46FD-A233-4E2CC9DD38D2"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "8DF4A322-7CC7-4AB9-B10E-FFF34DF2182D"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4C15FED5-C48C-47CF-9645-0563D77883C1"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A884B1BB-F201-4C77-9F6E-B8A884DCD4C2"
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "7C3BA5A3-1160-4793-A8D6-40B9D264BCC4"
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "6739DEA3-06FF-4FEB-9931-0DB27F63B70E"
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "0250EDF9-0AEF-4711-8EF6-D447CF48BCAF"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]