CVE-2024-40766
Published Aug 23, 2024
Last updated a month ago
AI description
CVE-2024-40766 is an improper access control vulnerability found in SonicWall SonicOS. The vulnerability lies in the SonicOS management access, potentially leading to unauthorized resource access. In specific conditions, this can cause the firewall to crash. The vulnerability affects SonicWall Firewall Gen 5 and Gen 6 devices, as well as Gen 7 devices running SonicOS 7.0.1-5035 and older versions. It is recommended to restrict firewall management access to trusted sources and ensure that firewall WAN management is not accessible from the public internet. Similarly, limiting SSLVPN access to trusted sources or disabling it from the internet is also advised.
- Description
- An improper access control vulnerability has been identified in the SonicWall SonicOS management access, potentially leading to unauthorized resource access and in specific conditions, causing the firewall to crash. This issue affects SonicWall Firewall Gen 5 and Gen 6 devices, as well as Gen 7 devices running SonicOS 7.0.1-5035 and older versions.
- Source
- PSIRT@sonicwall.com
- NVD status
- Analyzed
- Products
- sonicos
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Data from CISA
- Vulnerability name
- SonicWall SonicOS Improper Access Control Vulnerability
- Exploit added on
- Sep 9, 2024
- Exploit action due
- Sep 30, 2024
- Required action
- Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
- PSIRT@sonicwall.com
- CWE-284
- nvd@nist.gov
- NVD-CWE-noinfo
- Hype score
- Not currently trending
🚨 Marquis Ransomware Breach Hits 74 US Banks, Credit Unions Marquis Software Solutions—a vendor serving 74 US banks and credit unions—got hit by ransomware, exposing financial institution data on 400,000+ customers. What's notable: Akira ransomware exploited CVE-2024-40
@the_c_protocol
4 Dec 2025
57 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Ransomware vulns with highest exploit likelihood ⬆️ (past 30d): - CVE-2024-40766 (SonicOS SSL-VPN..) +64.88% - CVE-2022-27510 (NetScaler ADC..) +21.33% - CVE-2022-27510 (Gateway..) +21.33% - CVE-2021-27877 (Veritas Veritas..) +15.37% - CVE-2021-27876 (Veritas Veritas..) +14.
@DefusedCyber
1 Dec 2025
7197 Impressions
2 Retweets
23 Likes
9 Bookmarks
2 Replies
2 Quotes
Alerta sobre ransomware Akira: Operação expande ataques para Nutanix AHV VM encriptando discos via CVE-2024-40766 e explorando vulnerabilidades em firewalls SonicWall, exigindo backups offline e autenticação multifator rápida para proteção eficaz. https://t.co/RJOgQlpsUU
@caveiratech
14 Nov 2025
54 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
The ransomware strain Akira has expanded its reach to virtual machines running on Nutanix’s AHV platform. According to a recent advisory, the attack campaign began in June 2025 and exploited a critical vulnerability in SonicWall’s SonicOS (CVE-2024-40766) to gain a foothold.
@rtehrani
14 Nov 2025
82 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
The Akira ransomware group has earned over $244M by exploiting VMware ESXi servers and multiple vulnerabilities like CVE-2024-40766 and CVE-2023-28252, using credential theft and brute-force tactics. #AkiraGroup #RansomwareAttack #VMware https://t.co/XdFZRcysSD
@TweetThreatNews
14 Nov 2025
28 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA reports Akira ransomware targets Nutanix AHV VMs by encrypting .qcow2 disk files via SonicWall CVE-2024-40766 exploit. Attack uses stolen credentials and minimal platform interaction. #AkiraRansomware #NutanixAHV #USA https://t.co/RRgNhWrF3T
@TweetThreatNews
14 Nov 2025
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA identifies Akira ransomware as an imminent threat to U.S. critical infrastructure, leveraging exploits like SonicWall CVE-2024-40766 and Veeam vulnerabilities through VPN and SSH attacks. #AkiraGroup #CriticalInfrastructure #USA https://t.co/BLK3HbCfp4
@TweetThreatNews
13 Nov 2025
55 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Is your SonicWall SSL VPN truly secure? 🔒 The Akira ransomware group is actively exploiting SonicWall SSL VPNs by combining a patched vulnerability (CVE-2024-40766) with a critical security gap: unaddressed legacy accounts. This attack vector is particularly dangerous becaus
@HunterStrategy
14 Oct 2025
100 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 SonicWall SSL VPN 3,894件が露出 — MFAバイパス・OVERSTEP侵入を確認 複数のハッキンググループ(Akira、UNC6148)が既知の脆弱性CVE-2024-40766を悪用。 MFA環境でも侵入事例が発生しており、管理者は即時対応が
@CriminalIP_JP
14 Oct 2025
132 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
اگر از محصول SonicWall SSL VPN استفاده می کنید ، بررسی کنید که آیا آسیب پذیری با کد شناسایی CVE-2024-40766 پچ شده است یا خیر . به تازگی باج افزار Akira از این آسیب پذیری برای
@AmirHossein_sec
12 Oct 2025
103 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨CVE-2024-40766: Critical Improper Access Control Vulnerability Affecting SonicWall Devices CVSS: 9.3 FOFA: https://t.co/LxTe42aUQN Results: 473,950 FOFA Query: app="SONICWALL-SSL-VPN" Advisory: https://t.co/4Gpw41Btwg https://t.co/2vHVqxgPlV
@DarkWebInformer
10 Oct 2025
6286 Impressions
7 Retweets
29 Likes
7 Bookmarks
0 Replies
0 Quotes
SonicWall ファイアウォールを標的とする攻撃:Akira ランサムウェアによるログイン試行を分析 https://t.co/Ctt5l1tuRD SonicWall SSL VPN の脆弱性 CVE-2024-40766 を起点に、認証情報が悪用され、Akira
@iototsecnews
8 Oct 2025
188 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
Akira Reloaded https://t.co/n9P8eEJttx Akira ransomware attacks have surged since July 2025, exploiting a vulnerability in SonicWall VPNs (CVE-2024-40766) to gain rapid access to organizational networks. These attacks are characterized by their speed, with some intrusions comp
@f1tym1
7 Oct 2025
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-40766
@transilienceai
5 Oct 2025
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Akira ransomware group exploits CVE-2024-40766 and stolen SonicWall VPN credentials to breach and encrypt networks in under four hours, bypassing MFA and using advanced lateral movement techniques. #SonicWallVPN #AkiraRansomware #USA https://t.co/YnakNBRApy
@TweetThreatNews
30 Sept 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Cyber threat update hot off the press 🚨 – critical malware, sophisticated frauds, major vulnerabilities, and espionage cases unveiled in the last hour: 🛡️ SonicWall firewalls (Gen 5-7) under active attack exploiting CVE-2024-40766 SSL VPN flaw to deploy Akira ransomwar
@np_cyber_news
30 Sept 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[SonicWall CVE-2024-40766] Arctic Wolf révèle que la récente campagne ransomware Akira a compromis des comptes utilisateurs via le contournement du MFA. https://t.co/r6U3lXsZdo
@cert_ist
29 Sept 2025
67 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Since mid-2025, attackers are exploiting a severe vulnerability in SonicWall SSL VPNs (CVE-2024-40766). It's a wake-up call: patching is non-negotiable! #GRC #VulnerabilityManagement
@Cyb3r_5wift
29 Sept 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Akira ransomware exploits CVE-2024-40766 to breach SonicWall SSL VPN devices, bypassing MFA using stolen OTP seeds or other means. Attacks include rapid scanning, credential theft, and lateral movement. #AkiraRansomware #VPNBreach #USA https://t.co/IYXmxaL7WX
@TweetThreatNews
28 Sept 2025
124 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
Akiraランサムウェア集団が多要素認証で保護されたSonicWallのVPNアカウントを侵害している。Arctic Wolf社報告。SonicWall公式はCVE-2024-40766関連だとしている。金銭目的のUNC6148集団が窃取済みのOTPシードを用いてOVERST
@__kokumoto
28 Sept 2025
1292 Impressions
3 Retweets
6 Likes
2 Bookmarks
0 Replies
0 Quotes
Zero-day vulnerabilities lurk in popular software, unseen until exploited. Attacks like Stuxnet, Log4Shell, and CVE-2024-40766 reveal their devastating impact. Defending against them demands a strong defense-in-depth strategy to detect, contain, and recover. https://t.co/65KxYPjK
@The4n6Analyst
24 Sept 2025
35 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Akira ransomware explota fallas en SonicWall SSL VPN y errores de configuración para acceder a redes corporativas. 🔓 CVE-2024-40766 + LDAP mal configurado = acceso no autorizado. 🔗https://t.co/VIhrxxRAwA #Ransomware #Akira #SonicWall #CyberSecurity #VPN #ThreatIntel #
@trustlock_sec
19 Sept 2025
17 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
The #Akira ransomware group is back in action, exploiting a critical vulnerability (CVE-2024-40766) in SonicWall SSL VPN devices that was previously patched in August 2023. Affected #SonicWall versions include Gen 5, Gen 6, and Gen 7. https://t.co/djFwL9lzmp
@devcentral
19 Sept 2025
48 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 BREAKING SONICWALL : Violation MySonicWall expose configurations de 5% des pare-feu mondiaux ! Attaques brute-force API + CVE-2024-40766 = tempête parfaite cybercriminelle. https://t.co/tuprLhtm4C #SonicWall #MySonicWall #DataBreach #CyberSecurity #FirewallSecurity http
@ctrlaltnod
18 Sept 2025
2 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Researchers and authorities are warning that Akira ransomware attacks involving exploits of a year-old vulnerability affecting SonicWall firewalls are on the rise. A burst of about 40 attacks linked to CVE-2024-40766 hit SonicWall firewalls between mid-July and early August. ht
@CyberScoopNews
16 Sept 2025
445 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
Researchers and authorities are warning that Akira ransomware attacks involving exploits of a year-old vulnerability affecting SonicWall firewalls are on the rise. A burst of about 40 attacks linked to CVE-2024-40766 hit SonicWall firewalls between mid-July and early August. ht
@CyberScoopNews
15 Sept 2025
353 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
This is your Monday reminder to immediately apply patches if you are using SonicWall firewalls. The Akira ransomware group is actively attacking SonicWall firewalls by exploiting a known, year-old vulnerability (CVE-2024-40766: https://t.co/FqaWEywjKU
@CybelAngel
15 Sept 2025
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Researchers and authorities are warning that Akira ransomware attacks involving exploits of a year-old vulnerability affecting SonicWall firewalls are on the rise. A burst of about 40 attacks linked to CVE-2024-40766 hit SonicWall firewalls between mid-July and early August. ht
@CyberScoopNews
14 Sept 2025
491 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Top 5 Trending CVEs: 1 - CVE-2024-40766 2 - CVE-2025-54135 3 - CVE-2018-20587 4 - CVE-2022-46689 5 - CVE-2025-32756 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
14 Sept 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical Threat Alert: The SonicWall SSL VPN vulnerability (CVE-2024-40766) is being actively exploited by Akira Ransomware. Our guide provides the full threat intel and defense strategies. Read the full report: https://t.co/ks145AMJKc https://t.co/btW5RtlZco
@Iambivash007
13 Sept 2025
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
HybridPetya ransomware exploits CVE-2024-7344 to bypass UEFI Secure Boot. Akira targets SonicWall SSLVPN with CVE-2024-40766. Panama Ministry breached amid widespread patches for DELMIA, Cisco IOS XR, Samsung, Adobe. #Panama #UEFESecurity #SonicWall https://t.co/LEB3rIOUoE
@TweetThreatNews
13 Sept 2025
445 Impressions
0 Retweets
2 Likes
1 Bookmark
0 Replies
0 Quotes
Akira ransomware affiliates continue exploiting CVE-2024-40766 in SonicWall firewalls, targeting organizations globally through misconfigurations and outdated software amid firewall migrations. #SonicWall #Ransomware #USA https://t.co/1mj0j79foI
@TweetThreatNews
12 Sept 2025
174 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
📝 𝐒𝐨𝐧𝐢𝐜𝐖𝐚𝐥𝐥 𝐟𝐢𝐫𝐞𝐰𝐚𝐥𝐥𝐬 𝐭𝐚𝐫𝐠𝐞𝐭𝐞𝐝 𝐛𝐲 𝐟𝐫𝐞𝐬𝐡 𝐀𝐤𝐢𝐫𝐚 𝐫𝐚𝐧𝐬𝐨𝐦𝐰𝐚𝐫𝐞 𝐬𝐮𝐫𝐠𝐞 • Akira ransomware attacks exploiting SonicWall fir
@PurpleOps_io
12 Sept 2025
103 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Akira ransomware exploits three SonicWall flaws—including CVE-2024-40766 and SSLVPN misconfigs—to breach networks fast. Patch, enable MFA, and restrict access now. 🔐⚠️ #AkiraRansomware #Vulnerability https://t.co/pQZMaIqLtf
@manuelbissey
12 Sept 2025
101 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
一世を風靡したFirewallのSonicwallのVPN脆弱性がRansomwareの餌食になる CVE-2024-40766脆弱性問題が未解決で起こる乗っ取り。かって強固で知られたファイヤーウォールの名門ですが、最近は元気ないのでしょうか? http
@innovative_ec
12 Sept 2025
10 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Researchers warn that the Akira ransomware group exploits a year-old SonicWall flaw (CVE-2024-40766) using multiple vectors for access, urging users to secure accounts and apply patches to prevent unauthorized access. #CyberSecurity #Ransomware https://t.co/Hu71kxBimU
@Cyber_O51NT
12 Sept 2025
556 Impressions
0 Retweets
5 Likes
0 Bookmarks
2 Replies
0 Quotes
CVE-2024-40766 Detail https://t.co/DOmw14fxGn
@chasster123
11 Sept 2025
57 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers. Attacks exploit a year-old security flaw (CVE-2024-40766, CVSS score: 9.3) where local user passwords were carried over during the migration and not reset. https://t.co/xEOW0mJnDx https:/
@riskigy
11 Sept 2025
74 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Since late July 2025, Akira hackers have targeted SonicWall firewalls, exploiting a year-old vulnerability (CVE-2024-40766) alongside misconfigurations. Don't let complacency be your downfall! 🔒 #ThreatHunting
@Cyb3r_5wift
11 Sept 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Akira ransomware is exploiting a critical, year-old SonicWall SSLVPN bug (CVE-2024-40766) for unauthorized access. Patch now! 🚨 https://t.co/nFPi2p3dHD #AkiraRansomware #SonicWall #CVE202440766
@0xT3chn0m4nc3r
11 Sept 2025
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Akira ransomware exploiting critical SonicWall SSLVPN bug again The Akira ransomware gang is actively exploiting CVE-2024-40766, a year-old critical-severity access co… https://t.co/yUvGA9oWMq https://t.co/cPgS1fruUf
@DConsultinguk
11 Sept 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Urgent Warning! The ACSC is warning that a critical SonicWall vulnerability (CVE-2024-40766) is being actively exploited. Our exclusive report has the full analysis. #SonicWall #Cybersecurity #CVE https://t.co/5cukKLOw1q https://t.co/wBHdzn2vxs
@Iambivash007
11 Sept 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Vulnerability Alert: Akira ransomware is exploiting SonicWall SSL VPNs via CVE-2024-40766 (CVSS 9.3), LDAP misconfigs, and exposed portals. Initial access = RCE, data theft, ransomware. Mitigate: • Rotate local creds • Enforce MFA • Restrict access https://t.co/1VYrFOfO6n
@CloneSystemsInc
11 Sept 2025
67 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Срочное предупреждение! В Австралии выявлена уязвимость CVE-2024-40766, затрагивающая устройства SonicWall SSL VPN. Хакеры используют этот недостаток для несанкцион
@cybereye_ru
11 Sept 2025
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔒 Did you know CVE-2024-40766 has a staggering CVSS score of 9.8? 🚨 Akira ransomware is targeting SonicWall devices, exploiting potential zero-day vulnerabilities! #Cybersecurity #Ransomware https://t.co/XsUW0OxMvd
@Cyb3r_5wift
11 Sept 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Australia’s Cyber Security Centre alerts on active exploitation of CVE-2024-40766 in SonicWall SSL VPN devices, enabling Akira ransomware to bypass controls and crash firewalls. Firmware updates and credential resets critical. #SonicWallVPN #RansomwareAt… https://t.co/G5juQiB
@TweetThreatNews
11 Sept 2025
144 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
🚨 Akira ransomware is back — hammering SonicWall VPNs through a year-old flaw (CVE-2024-40766, CVSS 9.3). One misstep in SonicWall’s LDAP “Default User Group” can hand attackers VPN + admin access the moment they steal a password. Akira has already hit 967 victims an
@TheHackersNews
11 Sept 2025
77187 Impressions
56 Retweets
150 Likes
26 Bookmarks
0 Replies
2 Quotes
Ongoing active exploitation of SonicWall SSL VPNs in Australia (CVE-2024-40766) https://t.co/XqExgv8Fd6
@Dinosn
10 Sept 2025
1722 Impressions
2 Retweets
4 Likes
0 Bookmarks
0 Replies
0 Quotes
Undisclosed SonicWall Zero Day Leading to Akira Ransomware https://t.co/5C3rieuDIu SonicWall has linked recent SSLVPN security incidents to CVE-2024-40766, affecting Gen 7 and newer firewalls, with less than 40 identified incidents primarily during Gen 6 to Gen 7 migrations wh
@f1tym1
15 Aug 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
https://t.co/PTt8waIIpy SonicWall confirms recent SSL-VPN incidents on Gen 7+ firewalls aren’t caused by a zero-day, but tied to the known CVE-2024-40766. Most cases involved Gen 6 → Gen 7 password reuse without resets. #SonicWall #VulnerabilityManagement
@AnomalousBytes
11 Aug 2025
34 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "37E20C47-F8DA-4313-B9AD-C63CEA9D42C5",
"versionEndExcluding": "5.9.2.14-13o"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:soho:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "C6B6B3FD-428E-4D6C-8C45-172CF4FB430D"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0B16D102-B2BA-4F94-A42F-B8EB2E697907",
"versionEndExcluding": "6.5.2.8-2n"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:nssp_12400:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "F2F22AB1-044C-45F1-BD33-82BB46402363"
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_12800:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "E62EAD79-2CD4-4479-B26A-A0C97B5B241A"
},
{
"criteria": "cpe:2.3:h:sonicwall:sm9800:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "FCBF16D6-4C60-440D-95AB-986ABC4F9100"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CAFD6E22-8E19-4B5A-85DE-7850FE0AE7CF",
"versionEndExcluding": "6.5.4.15.116n"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "B7BCDFEE-DC5A-44B8-85DF-8BFC02B1A973"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_3600:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "8A24BCC0-CE41-49AF-B03D-D4FCB422503B"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "043858A6-26AC-4EB0-A240-A43AD08C6AD5"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_4600:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "8FD73880-DC60-467F-99B6-69807D58A840"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "73BB9452-A014-4A68-9662-63E6C60EEAD2"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_5600:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "B0CF683A-7E83-464B-8A0D-4CC641377FA6"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9FAAEBB4-F180-4195-BA7F-591AB02EEDC9"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_6600:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "CD9C3F77-2F1A-4C4F-A8F8-CDBFB7B87891"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "676B05B2-716E-4DC4-BEE8-0E3BCCA5DB27"
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9200:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "FEF2B435-957C-4BBE-937D-23E4F33189EF"
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9250:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "0CE4FE75-10AD-47D4-AF87-E4C294F89EA8"
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9400:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "B485C543-DFCF-4481-92B4-F7198EE4FBD1"
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9450:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "928C1C0D-7AF7-4076-B5B2-207DFF3AD6A4"
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9600:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "F030C5AB-36CA-445E-AC87-8DEE18DBB40E"
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9650:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A1F9D940-8AE2-4B92-B69D-9FF6F48DF16C"
},
{
"criteria": "cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9FDE64E9-44DD-4B7C-BA34-FE2C79E3FAED"
},
{
"criteria": "cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4E8F3935-89B4-4091-9B8C-442C02FD4F3A"
},
{
"criteria": "cpe:2.3:h:sonicwall:sohow:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "7268E89B-FF46-45AD-82FF-333505EF957B"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_300:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "0804FADE-57F7-452F-86B3-079701059D37"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_300p:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9956F726-6D62-4616-B60A-4D3DD6F32105"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_300w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "29F4D403-F20A-4802-AAE9-9582486EB436"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_350:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "675F28A7-0BB3-4CDA-855E-7EFC650B512E"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_350w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "FF991212-3F2C-4F54-B96C-C33F500DB77B"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_400:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "5983C650-84F6-4B2E-A27E-9E83EA1DDC02"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_400w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "BDD4B412-7967-477F-929E-8F12A39186FF"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_500:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A1D996FA-52D1-47C2-87E6-682EEC9CA532"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_500w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "B9DEF6EE-000D-407D-AA2B-E039BA306A2A"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_600:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "C0B8BFA4-2E15-4318-B7A9-DBDE801D0CF0"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_600p:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "DCB8CDE6-8052-40F7-950F-05329499A58A"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "34814AB8-5F1D-44B4-B53B-FC4FA794DDAA",
"versionEndIncluding": "7.0.1-5035"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "8D8B0C7A-FD65-47CA-A625-150A90EFA7A1"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A69E000B-5806-46FD-A233-4E2CC9DD38D2"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "8DF4A322-7CC7-4AB9-B10E-FFF34DF2182D"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4C15FED5-C48C-47CF-9645-0563D77883C1"
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A884B1BB-F201-4C77-9F6E-B8A884DCD4C2"
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "7C3BA5A3-1160-4793-A8D6-40B9D264BCC4"
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "6739DEA3-06FF-4FEB-9931-0DB27F63B70E"
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "0250EDF9-0AEF-4711-8EF6-D447CF48BCAF"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307"
},
{
"criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]