fkie_cve-2025-40602
Vulnerability from fkie_nvd
Published
2025-12-18 11:15
Modified
2025-12-19 13:57
Severity ?
Summary
A local privilege escalation vulnerability due to insufficient authorization in the SonicWall SMA1000 appliance management console (AMC).
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| sonicwall | sma6200_firmware | * | |
| sonicwall | sma6200_firmware | * | |
| sonicwall | sma6200 | - | |
| sonicwall | sma6210_firmware | * | |
| sonicwall | sma6210_firmware | * | |
| sonicwall | sma6210 | - | |
| sonicwall | sma7200_firmware | * | |
| sonicwall | sma7200_firmware | * | |
| sonicwall | sma7200 | - | |
| sonicwall | sma7210_firmware | * | |
| sonicwall | sma7210_firmware | * | |
| sonicwall | sma7210 | - | |
| sonicwall | sma8200v | * | |
| sonicwall | sma8200v | * |
{
"cisaActionDue": "2025-12-24",
"cisaExploitAdd": "2025-12-17",
"cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable",
"cisaVulnerabilityName": "SonicWall SMA1000 Missing Authorization Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sma6200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA502098-85D4-4263-A972-5C257A27E566",
"versionEndExcluding": "12.4.3-03245",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sonicwall:sma6200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8117AD1-538B-4D74-B7BD-CDDFDF1CA5D6",
"versionEndExcluding": "12.5.0-02283",
"versionStartIncluding": "12.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:sma6200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57B3C90F-F633-41B9-855E-902F6DC8ACA5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sma6210_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "11F3325C-B52F-4569-A900-87A3062BA955",
"versionEndExcluding": "12.4.3-03245",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sonicwall:sma6210_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83F28647-1EB1-4BD4-806E-ECFA82C7F81F",
"versionEndExcluding": "12.5.0-02283",
"versionStartIncluding": "12.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:sma6210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B24D300-1154-49A1-A1F3-FB0CC717166A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sma7200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "634F6A69-541B-4C08-80CC-D75BCA1AFA0C",
"versionEndExcluding": "12.4.3-03245",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sonicwall:sma7200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "557266E9-9045-4686-B260-ADCCE884E47B",
"versionEndExcluding": "12.5.0-02283",
"versionStartIncluding": "12.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:sma7200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F7B4ED9-7A57-48DC-AAEC-A2C2EAFF3B64",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sma7210_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A4BD7021-91E8-4E68-AC7B-6C971E6C6F77",
"versionEndExcluding": "12.4.3-03245",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sonicwall:sma7210_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3FBEAD8B-7C9F-445C-BDC4-E2D19291D155",
"versionEndExcluding": "12.5.0-02283",
"versionStartIncluding": "12.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:sma7210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B414C5-C376-4216-A267-ABC0930905CE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sonicwall:sma8200v:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A68FFD03-F144-4F74-A7FC-700AC5CA789D",
"versionEndExcluding": "12.4.3-03245",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sonicwall:sma8200v:*:*:*:*:*:*:*:*",
"matchCriteriaId": "42CE52E0-1CD5-4CA2-85CB-D5BDB2FE63D8",
"versionEndExcluding": "12.5.0-02283",
"versionStartIncluding": "12.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A local privilege escalation vulnerability due to insufficient authorization in the SonicWall SMA1000 appliance management console (AMC)."
}
],
"id": "CVE-2025-40602",
"lastModified": "2025-12-19T13:57:43.150",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.7,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-12-18T11:15:46.760",
"references": [
{
"source": "PSIRT@sonicwall.com",
"tags": [
"Vendor Advisory"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0019"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"US Government Resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-40602"
}
],
"sourceIdentifier": "PSIRT@sonicwall.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-250"
},
{
"lang": "en",
"value": "CWE-862"
}
],
"source": "PSIRT@sonicwall.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…