CVE-2025-40604

Published Nov 20, 2025

Last updated 3 months ago

Overview

Description
Download of Code Without Integrity Check Vulnerability in the SonicWall Email Security appliance loads root filesystem images without verifying signatures, allowing attackers with VMDK or datastore access to modify system files and gain persistent arbitrary code execution.
Source
PSIRT@sonicwall.com
NVD status
Analyzed
Products
email_security_appliance_5000_firmware, email_security_appliance_5050_firmware, email_security_appliance_7000_firmware, email_security_appliance_7050_firmware, email_security_appliance_9000_firmware

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Weaknesses

PSIRT@sonicwall.com
CWE-494

Social media

Hype score
Not currently trending

Configurations

References

Sources include official advisories and independent security research.