CVE-2026-0206
Stack-based Buffer Overflow in SonicOS
Publication date: 2026-04-29
Last updated on: 2026-05-05
Assigner: SonicWALL, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sonicwall | sonicos | to 6.5.5.2-28n (exc) |
| sonicwall | sonicos | From 7.0.0.0 (inc) to 7.0.1-5169 (inc) |
| sonicwall | sonicos | From 7.1.1-7040 (inc) to 7.3.2-7010 (exc) |
| sonicwall | sonicos | From 8.0.0-8035 (inc) to 8.2.0-8009 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a post-authentication stack-based buffer overflow in SonicOS. It allows a remote attacker who has authenticated access to the system to exploit the flaw and cause the firewall to crash.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing a remote attacker to crash your firewall, potentially causing denial of service. This could disrupt network security and availability.
Can you explain this vulnerability to me?
This vulnerability is a post-authentication stack-based buffer overflow in SonicOS. It allows a remote attacker who has authenticated access to the system to exploit the flaw and cause the firewall to crash.
How can this vulnerability impact me? :
The impact of this vulnerability is that a remote attacker can cause a denial of service by crashing the firewall. This can disrupt network security and availability, potentially leading to downtime or loss of protection.