fkie_cve-2025-40602
Vulnerability from fkie_nvd
Published
2025-12-18 11:15
Modified
2025-12-19 13:57
Summary
A local privilege escalation vulnerability due to insufficient authorization in the SonicWall SMA1000 appliance management console (AMC).



{
  "cisaActionDue": "2025-12-24",
  "cisaExploitAdd": "2025-12-17",
  "cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable",
  "cisaVulnerabilityName": "SonicWall SMA1000 Missing Authorization Vulnerability",
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:sma6200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA502098-85D4-4263-A972-5C257A27E566",
              "versionEndExcluding": "12.4.3-03245",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:sma6200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8117AD1-538B-4D74-B7BD-CDDFDF1CA5D6",
              "versionEndExcluding": "12.5.0-02283",
              "versionStartIncluding": "12.5.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:sma6200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57B3C90F-F633-41B9-855E-902F6DC8ACA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:sma6210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11F3325C-B52F-4569-A900-87A3062BA955",
              "versionEndExcluding": "12.4.3-03245",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:sma6210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "83F28647-1EB1-4BD4-806E-ECFA82C7F81F",
              "versionEndExcluding": "12.5.0-02283",
              "versionStartIncluding": "12.5.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:sma6210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B24D300-1154-49A1-A1F3-FB0CC717166A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:sma7200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "634F6A69-541B-4C08-80CC-D75BCA1AFA0C",
              "versionEndExcluding": "12.4.3-03245",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:sma7200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "557266E9-9045-4686-B260-ADCCE884E47B",
              "versionEndExcluding": "12.5.0-02283",
              "versionStartIncluding": "12.5.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:sma7200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F7B4ED9-7A57-48DC-AAEC-A2C2EAFF3B64",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:sma7210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4BD7021-91E8-4E68-AC7B-6C971E6C6F77",
              "versionEndExcluding": "12.4.3-03245",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:sma7210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FBEAD8B-7C9F-445C-BDC4-E2D19291D155",
              "versionEndExcluding": "12.5.0-02283",
              "versionStartIncluding": "12.5.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:sma7210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B414C5-C376-4216-A267-ABC0930905CE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sonicwall:sma8200v:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A68FFD03-F144-4F74-A7FC-700AC5CA789D",
              "versionEndExcluding": "12.4.3-03245",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sonicwall:sma8200v:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42CE52E0-1CD5-4CA2-85CB-D5BDB2FE63D8",
              "versionEndExcluding": "12.5.0-02283",
              "versionStartIncluding": "12.5.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A local privilege escalation vulnerability due to insufficient authorization in the SonicWall SMA1000 appliance management console (AMC)."
    }
  ],
  "id": "CVE-2025-40602",
  "lastModified": "2025-12-19T13:57:43.150",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.6,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.7,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-12-18T11:15:46.760",
  "references": [
    {
      "source": "PSIRT@sonicwall.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0019"
    },
    {
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "tags": [
        "US Government Resource"
      ],
      "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-40602"
    }
  ],
  "sourceIdentifier": "PSIRT@sonicwall.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-250"
        },
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "PSIRT@sonicwall.com",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…