CVE-2024-40766
Published Aug 23, 2024
Last updated a year ago
AI description
CVE-2024-40766 is an improper access control vulnerability found in SonicWall SonicOS. The vulnerability lies in the SonicOS management access, potentially leading to unauthorized resource access. In specific conditions, this can cause the firewall to crash. The vulnerability affects SonicWall Firewall Gen 5 and Gen 6 devices, as well as Gen 7 devices running SonicOS 7.0.1-5035 and older versions. It is recommended to restrict firewall management access to trusted sources and ensure that firewall WAN management is not accessible from the public internet. Similarly, limiting SSLVPN access to trusted sources or disabling it from the internet is also advised.
- Description
- An improper access control vulnerability has been identified in the SonicWall SonicOS management access, potentially leading to unauthorized resource access and in specific conditions, causing the firewall to crash. This issue affects SonicWall Firewall Gen 5 and Gen 6 devices, as well as Gen 7 devices running SonicOS 7.0.1-5035 and older versions.
- Source
- PSIRT@sonicwall.com
- NVD status
- Analyzed
- Products
- sonicos
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Data from CISA
- Vulnerability name
- SonicWall SonicOS Improper Access Control Vulnerability
- Exploit added on
- Sep 9, 2024
- Exploit action due
- Sep 30, 2024
- Required action
- Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
- nvd@nist.gov
- NVD-CWE-noinfo
- PSIRT@sonicwall.com
- CWE-284
- Hype score
- Not currently trending
Actively exploited CVE : CVE-2024-40766
@transilienceai
10 Aug 2025
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
#VeilleCyber : 📱 #Bouygues : 6,4M clients exposés (IBAN, coordonnées) 🖥️ Millions de PC #Dell vulnérables aux backdoors #ReVault ✈️ #AirFranceKLM : fuite CRM par #ShinyHunters 🔐 #SonicWall : attaques sur CVE-2024-40766 Détails et conseils 👇 https://t.co/PNV
@VeilleCyber_fr
10 Aug 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall has dismissed zero-day vulnerability fears after investigating recent ransomware attacks, confirming they stem from the known flaw CVE-2024-40766, urging users to update firmware and reset passwords for improved security. #Cybersecurity #Ransom… https://t.co/kCZQAMfKd
@Cyber_O51NT
9 Aug 2025
264 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall says that recent Akira ransomware attacks exploiting Gen 7 firewalls with SSLVPN enabled are exploiting an older vulnerability rather than a zero-day flaw. The company says that the attackers are targeting CVE-2024-40766, fixed in August 2024. https://t.co/OiXMymOkGF ht
@riskigy
8 Aug 2025
57 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#sonicwall says recent Gen 7 firewall hacks were not a zero-day but exploited CVE-2024-40766, tied to reused legacy passwords during migrations. Fewer than 40 confirmed cases, with Akira ransomware deployed. Users urged to update and reset credentials. https://t.co/eVP2kVNdhC
@Prevent_Cyber
8 Aug 2025
65 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall confirms no zero-day vulnerabilities are being exploited despite reports of targeted ransomware attacks linked to CVE-2024-40766. Weak password management during device migration facilitated the breaches. #CyberDefense #Ransomware #Japan https://t.co/rT85TfKOaX
@TweetThreatNews
7 Aug 2025
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#SonicWall updated its advisory on the recent campaign against its firewalls, claiming the incidents are likely tied to the exploitation of CVE-2024-40766 and not a new bug They are investigating about 40 incidents https://t.co/R9A2sCHPhj
@jgreigj
7 Aug 2025
49 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 SonicWall Vulnerability Exploited in August Akira Campaign Recent Akira ransomware intrusions have been linked to CVE-2024-40766, a previously disclosed vulnerability affecting SonicWall firewall appliances. Initial reporting suggested the possibility of a zero-day https://
@mox_five
7 Aug 2025
76 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall confirmed that recent attacks on its Gen 7 firewalls with SSL VPN are linked to CVE-2024-40766, a patched vulnerability (CVSS score: 9.3) related to improper access control. https://t.co/MgAdr2D927
@securityRSS
7 Aug 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📌 سونيك وول أكدت أن الهجمات الأخيرة على جدران الحماية من الجيل السابع وما فوق المتعلقة بـ SSL VPN ناتجة عن ثغرة قديمة تم تصحيحها وإعادة استخدام كلمات المرور
@Cybercachear
7 Aug 2025
41 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Attackers are hitting SonicWall firewalls again—but it’s not a new zero-day. Turns out, they’re exploiting a known bug (CVE-2024-40766) and weak password hygiene. Migrating from Gen 6 to Gen 7 without resets? That’s leaving doors wide open. Fu... https://t.co/zf
@IT_news_for_all
7 Aug 2025
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Attackers are hitting SonicWall firewalls again—but it’s not a new zero-day. Turns out, they’re exploiting a known bug (CVE-2024-40766) and weak password hygiene. Migrating from Gen 6 to Gen 7 without resets? That’s leaving doors wide open. Full details + what to
@TheHackersNews
7 Aug 2025
10636 Impressions
24 Retweets
60 Likes
12 Bookmarks
1 Reply
1 Quote
🚨 Attackers are hitting SonicWall firewalls again—but it’s not a new zero-day. Turns out, they’re exploiting a known bug (CVE-2024-40766) and weak password hygiene. Migrating from Gen 6 to Gen 7 without resets? That’s leaving doors wide open. Full... https://t.co/gC
@IT_news_for_all
7 Aug 2025
39 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
موجة هجمات فدية جديدة تستهدف SonicWall، وتكشف التقارير استغلال محتمل لثغرة يوم صفر في SonicOS لتوزيع برمجية Akira. -الهجمات طالت أجهزة محدثة وتستخدم MFA - الهجمات بد
@cyberscastx
4 Aug 2025
1761 Impressions
2 Retweets
10 Likes
2 Bookmarks
3 Replies
0 Quotes
🚨 Ransomware on the Rise! December 2024 saw a record-breaking 621 victims of ransomware attacks. New groups like FunkSec & SafePay are gaining momentum, while old players like Akira exploit vulnerabilities like CVE-2024-40766. Protect your organization NOW! 🛡️ https://t.co
@QnATech
16 Jan 2025
66 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
#Malware #Vulnerability Thousands of SonicWall Devices Remain Vulnerable to CVE-2024-40766 https://t.co/UtKzhVf5rC
@Komodosec
9 Jan 2025
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Threat Alert: SonicWall Issues Important Security Advisory for Multiple Vulnerabilities in Son CVE-2024-40766 Severity: ⚠️ Critical Maturity: 💥 Mainstream Learn more: https://t.co/rOv4wJ1kn7 #CyberSecurity #ThreatIntel #InfoSec (1/3)
@fletch_ai
9 Jan 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Over 48,000 SonicWall devices remain vulnerable to a critical security flaw, exposing organizations worldwide to ransomware attacks. The vulnerability, identified as CVE-2024-40766, was first disclosed in September 2024. #Ransomware #CyberSecurityAwareness #MalwareAlert #Hack ht
@techaniruddh
7 Jan 2025
157 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Additional Evidence of SonicWall CVE-2024-40766 Exploitation by Akira and Fog, and Patch Progress - Security Research Center Blog #vuln #akira #fog https://t.co/FtRYB1tfHH
@johntheMAT
27 Dec 2024
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Additional Evidence of SonicWall CVE-2024-40766 Exploitation by Akira and Fog, and Patch Progress - Security Research Center Blog https://t.co/fxXQ8bC5lZ
@anemone_fish
27 Dec 2024
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
AkiraとFogによるSonicWall CVE-2024-40766悪用の追加証拠とパッチの進捗状況の記事を書きました。 『Additional Evidence of SonicWall CVE-2024-40766 Exploitation by Akira and Fog, and Patch Progress』 https://t.co/K3BW5jwffd
@nekono_naha
27 Dec 2024
1645 Impressions
5 Retweets
16 Likes
8 Bookmarks
0 Replies
0 Quotes
SonicWall SSLVPN access control flaw is now exploited in attacks SonicWall is warning that a recently fixed access control flaw tracked as CVE-2024-40766 in SonicOS is now "potentially" exploited in attacks, urging admins to apply patches as soon as po... https://t.co/DzZwTl6WET
@SecurityAid
22 Dec 2024
27 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
印象に残った2024年の公開サーバ脆弱性まとめ。脆弱性大賞は1位 Ivanti、2位Palo Alto、3位Fortinet。審査員特別賞は SonicWall CVE-2024-40766です。私の調べではAkiraとFogによる被害組織が100を超えてますがどのベンダも脆弱性悪用を断言できておらず大変後味が悪いため。 所感:… https://t.co/fXdM81wJQr https://t.co/dn1z3YfVvQ
@nekono_naha
19 Dec 2024
9200 Impressions
33 Retweets
136 Likes
59 Bookmarks
0 Replies
2 Quotes
【独自】ランサムウェア活動で、Array Networks AG/vxAGの脆弱性CVE-2023-28461と、SonicWall SonicOSの脆弱性CVE-2024-40766がそれぞれ悪用された模様。米国サイバーセキュリティ・社会基盤安全保障庁(CISA)の既知の悪用された脆弱性カタログが更新。 https://t.co/8OLgYfFXPf
@__kokumoto
2 Dec 2024
1483 Impressions
2 Retweets
10 Likes
3 Bookmarks
0 Replies
0 Quotes
Fog & Akira ransomware groups are exploiting the critical CVE-2024-40766 vulnerability in SonicWall VPN systems, targeting enterprises and critical infrastructure. Protect your systems with the latest patch. https://t.co/ti9a9cUFQP
@Shift6Security
25 Nov 2024
75 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Zunahme von Fog- und Akira-Ransomware Im September gab SonicWall bekannt, dass CVE-2024-40766 aktiv ausgenutzt wird. #available_in_English #Akira #ArcticWolf #Fog #Ransomware https://t.co/CETHYkcDhD https://t.co/1wCgmLjCFb
@B2bCyber
23 Nov 2024
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-40766
@transilienceai
23 Nov 2024
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-40766
@transilienceai
19 Nov 2024
20 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-40766
@transilienceai
18 Nov 2024
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-40766
@transilienceai
17 Nov 2024
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-40766
@transilienceai
10 Nov 2024
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-40766
@transilienceai
8 Nov 2024
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
#Fog and #Akira #ransomware attacks #exploit #SonicWall #VPN #Vulnerabilities #flaw CVE-2024-40766 https://t.co/04lXKFoF3k https://t.co/f2e8oJa19p
@omvapt
7 Nov 2024
113 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-40766
@transilienceai
5 Nov 2024
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
CVE-2024-40766
@WakeUpDeath
4 Nov 2024
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
آسیب پذیری جدیدی با کد شناسایی CVE-2024-40766 برای محصول SonicWall VPN منتشر شده است. باج افزارها، از آسیب پذیری ها برای گرفتن دسترسی به سیستم های قربانی ، استفاده می کنند. باج افزارهای FoG و Akira از آسیب پذیری SonicWall VPN استفاده می کنند. https://t.co/Y2P1U3epiq https://t.
@AmirHossein_sec
1 Nov 2024
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Fog ransomware e Akira: attacco ai sistemi VPN SonicWall Sicurezza Informatica, accesso iniziale, Akira, CVE-2024-40766, cybercrime, Fog ransomware, sonicwall, VPN, vulnerabilità https://t.co/JJrtubWtQU https://t.co/SmYT4r2qxG
@matricedigitale
31 Oct 2024
50 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Hackers are exploiting a vulnerability in #SonicWall #VPN to launch ransomware attacks using the Fog and Akira strains. CVE-2024-40766 https://t.co/2zdhqQXeCE
@the_yellow_fall
30 Oct 2024
90 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall vulnerability CVE-2024-40766 exploited in Ransomware attacks #Sonicwall #CVE-2024-40766 #FogRansomware #AkiraRansomware https://t.co/uxLT25Fc8p
@pravin_karthik
30 Oct 2024
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Хакерские группировки Akira и Fog объединили усилия для проведения атак, используя уязвимость в VPN-системах SonicWall. Недавно обнаруженная уязвимость CVE-2024-40766 в системе SSL VPN открыла двери для незаконного доступа к корпоративным сетям: https://t.co/Nh9Vl0NJoy #Akira ht
@infosecmedia_
29 Oct 2024
27 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Fog and Akira ransomware operators are increasingly breaching corporate networks through SonicWall VPN accounts, with the threat actors believed to be exploiting CVE-2024-40766, a critical SSL VPN access control flaw fixed in August 2024. https://t.co/ErEdEHwkHe https://t.co/BBcU
@riskigy
29 Oct 2024
48 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Hackers Use Fog Ransomware To Attack SonicWall VPNs And Breach Corporate Networks: Recent cyberattacks involving Akira and Fog threat actors have targeted various industries, exploiting a vulnerability (CVE-2024-40766) in SonicWall SSL VPN devices, where… https://t.co/dRikXpc4SH
@shah_sheikh
29 Oct 2024
177 Impressions
1 Retweet
1 Like
0 Bookmarks
2 Replies
0 Quotes
Fog and Akira ransomware operators are exploiting the SonicWall VPN flaw CVE-2024-40766, prompting SonicWall to urge affected users to apply patches to prevent unauthorized access and potential firewall crashes. #CyberSecurity #Ransomware https://t.co/NucrwWDCRo
@Cyber_O51NT
29 Oct 2024
497 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
Fog and Akira ransomware attacks exploit SonicWall VPN flaw CVE-2024-40766 https://t.co/Wcpr3hajqS #BreakingNews https://t.co/EiI9BdqIyf
@evanderburg
29 Oct 2024
103 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Fog and Akira ransomware attacks exploit SonicWall VPN flaw CVE-2024-40766: Fog and Akira ransomware operators are exploiting SonicWall VPN flaw CVE-2024-40766 to breach enterprise networks. Fog and Akira ransomware operators are exploiting the critical… https://t.co/e5SSCeFui1 h
@shah_sheikh
29 Oct 2024
46 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Fog ransomware targets SonicWall VPNs to breach corporate networks: https://t.co/hqg01Y2Kr7 Fog and Akira ransomware are exploiting a critical SSL VPN access control flaw (CVE-2024-40766) in SonicWall VPNs to breach corporate networks. SonicWall patched the flaw in August 2024,…
@securityRSS
29 Oct 2024
28 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Fog and Akira ransomware operators are increasingly breaching corporate networks through SonicWall VPN accounts, with the threat actors believed to be exploiting CVE-2024-40766, a critical SSL VPN access control flaw. https://t.co/8NJFgZjG4l
@blackwired32799
28 Oct 2024
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A critical vulnerability in SonicWall VPN devices is being exploited by Akira and Fog ransomware groups, compromising corporate networks. 🚨 CVE-2024-40766 - CVSS: 9.8 168,000 SonicWall endpoints remain vulnerable to the CVE-2024-40766 vulnerability (Security researcher Yutaka…
@cytexsmb
28 Oct 2024
576 Impressions
4 Retweets
4 Likes
0 Bookmarks
0 Replies
3 Quotes
#NEW #SHARE Fog and Akira ransomware operators are increasingly breaching corporate networks through SonicWall VPN accounts, with the threat actors believed to be exploiting CVE-2024-40766, a critical SSL VPN access control flaw. https://t.co/z7XyXk8vi0
@CyberSysblue
28 Oct 2024
47 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨威胁警报!使用CVE-2024-40766通过SonicWall VPN账户侵入企业网络,Akira和Fog勒索软件操作合作。确保及时打补丁,启用多因素认证,密切监控VPN访问!#网络安全#SonicWall#VPN#勒索软件🛡️💻 https://t.co/9tL3yNuf8u
@cverc_cn2
28 Oct 2024
28 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "37E20C47-F8DA-4313-B9AD-C63CEA9D42C5",
"versionEndExcluding": "5.9.2.14-13o"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:soho:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "C6B6B3FD-428E-4D6C-8C45-172CF4FB430D"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0B16D102-B2BA-4F94-A42F-B8EB2E697907",
"versionEndExcluding": "6.5.2.8-2n"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:nssp_12400:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "F2F22AB1-044C-45F1-BD33-82BB46402363"
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_12800:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "E62EAD79-2CD4-4479-B26A-A0C97B5B241A"
},
{
"criteria": "cpe:2.3:h:sonicwall:sm9800:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "FCBF16D6-4C60-440D-95AB-986ABC4F9100"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CAFD6E22-8E19-4B5A-85DE-7850FE0AE7CF",
"versionEndExcluding": "6.5.4.15.116n"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "B7BCDFEE-DC5A-44B8-85DF-8BFC02B1A973"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_3600:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "8A24BCC0-CE41-49AF-B03D-D4FCB422503B"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "043858A6-26AC-4EB0-A240-A43AD08C6AD5"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_4600:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "8FD73880-DC60-467F-99B6-69807D58A840"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "73BB9452-A014-4A68-9662-63E6C60EEAD2"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_5600:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "B0CF683A-7E83-464B-8A0D-4CC641377FA6"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9FAAEBB4-F180-4195-BA7F-591AB02EEDC9"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_6600:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "CD9C3F77-2F1A-4C4F-A8F8-CDBFB7B87891"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "676B05B2-716E-4DC4-BEE8-0E3BCCA5DB27"
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9200:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "FEF2B435-957C-4BBE-937D-23E4F33189EF"
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9250:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "0CE4FE75-10AD-47D4-AF87-E4C294F89EA8"
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9400:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "B485C543-DFCF-4481-92B4-F7198EE4FBD1"
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9450:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "928C1C0D-7AF7-4076-B5B2-207DFF3AD6A4"
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9600:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "F030C5AB-36CA-445E-AC87-8DEE18DBB40E"
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9650:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A1F9D940-8AE2-4B92-B69D-9FF6F48DF16C"
},
{
"criteria": "cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9FDE64E9-44DD-4B7C-BA34-FE2C79E3FAED"
},
{
"criteria": "cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4E8F3935-89B4-4091-9B8C-442C02FD4F3A"
},
{
"criteria": "cpe:2.3:h:sonicwall:sohow:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "7268E89B-FF46-45AD-82FF-333505EF957B"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_300:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "0804FADE-57F7-452F-86B3-079701059D37"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_300p:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9956F726-6D62-4616-B60A-4D3DD6F32105"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_300w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "29F4D403-F20A-4802-AAE9-9582486EB436"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_350:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "675F28A7-0BB3-4CDA-855E-7EFC650B512E"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_350w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "FF991212-3F2C-4F54-B96C-C33F500DB77B"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_400:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "5983C650-84F6-4B2E-A27E-9E83EA1DDC02"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_400w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "BDD4B412-7967-477F-929E-8F12A39186FF"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_500:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A1D996FA-52D1-47C2-87E6-682EEC9CA532"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_500w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "B9DEF6EE-000D-407D-AA2B-E039BA306A2A"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_600:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "C0B8BFA4-2E15-4318-B7A9-DBDE801D0CF0"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_600p:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "DCB8CDE6-8052-40F7-950F-05329499A58A"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "34814AB8-5F1D-44B4-B53B-FC4FA794DDAA",
"versionEndIncluding": "7.0.1-5035"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "8D8B0C7A-FD65-47CA-A625-150A90EFA7A1"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A69E000B-5806-46FD-A233-4E2CC9DD38D2"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "8DF4A322-7CC7-4AB9-B10E-FFF34DF2182D"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4C15FED5-C48C-47CF-9645-0563D77883C1"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A884B1BB-F201-4C77-9F6E-B8A884DCD4C2"
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "7C3BA5A3-1160-4793-A8D6-40B9D264BCC4"
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "6739DEA3-06FF-4FEB-9931-0DB27F63B70E"
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "0250EDF9-0AEF-4711-8EF6-D447CF48BCAF"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]