CVE-2026-3469
Denial-of-Service in SonicWall Email Security via Input Validation
Publication date: 2026-03-31
Last updated on: 2026-04-13
Assigner: SonicWALL, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sonicwall | email_security | to 10.0.35.8405 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a denial-of-service (DoS) issue in the SonicWall Email Security appliance. It occurs because the application does not properly validate input, which allows a remote attacker who is authenticated as an admin user to cause the application to become unresponsive.
How can this vulnerability impact me? :
The impact of this vulnerability is that an attacker with admin credentials can make the SonicWall Email Security appliance unresponsive, leading to a denial-of-service condition. This could disrupt email security services and potentially affect business operations that rely on this appliance.