FKIE_CVE-2026-0205
Vulnerability from fkie_nvd - Published: 2026-04-29 17:16 - Updated: 2026-05-05 16:12
Severity ?
Summary
A post-authentication Path Traversal vulnerability in SonicOS allows an attacker to interact with usually restricted services.
References
| URL | Tags | ||
|---|---|---|---|
| PSIRT@sonicwall.com | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2026-0004 | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AECA7D87-803A-44ED-AD56-D609317D603A",
"versionEndExcluding": "6.5.5.2-28n",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7BCDFEE-DC5A-44B8-85DF-8BFC02B1A973",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_3600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A24BCC0-CE41-49AF-B03D-D4FCB422503B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "043858A6-26AC-4EB0-A240-A43AD08C6AD5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_4600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FD73880-DC60-467F-99B6-69807D58A840",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73BB9452-A014-4A68-9662-63E6C60EEAD2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0CF683A-7E83-464B-8A0D-4CC641377FA6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FAAEBB4-F180-4195-BA7F-591AB02EEDC9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD9C3F77-2F1A-4C4F-A8F8-CDBFB7B87891",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "676B05B2-716E-4DC4-BEE8-0E3BCCA5DB27",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF2B435-957C-4BBE-937D-23E4F33189EF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CE4FE75-10AD-47D4-AF87-E4C294F89EA8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B485C543-DFCF-4481-92B4-F7198EE4FBD1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "928C1C0D-7AF7-4076-B5B2-207DFF3AD6A4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F030C5AB-36CA-445E-AC87-8DEE18DBB40E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:sm_9650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1F9D940-8AE2-4B92-B69D-9FF6F48DF16C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FDE64E9-44DD-4B7C-BA34-FE2C79E3FAED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E8F3935-89B4-4091-9B8C-442C02FD4F3A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:sohow:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7268E89B-FF46-45AD-82FF-333505EF957B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0804FADE-57F7-452F-86B3-079701059D37",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_300p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9956F726-6D62-4616-B60A-4D3DD6F32105",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_300w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29F4D403-F20A-4802-AAE9-9582486EB436",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "675F28A7-0BB3-4CDA-855E-7EFC650B512E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_350w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF991212-3F2C-4F54-B96C-C33F500DB77B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5983C650-84F6-4B2E-A27E-9E83EA1DDC02",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_400w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BDD4B412-7967-477F-929E-8F12A39186FF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1D996FA-52D1-47C2-87E6-682EEC9CA532",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_500w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9DEF6EE-000D-407D-AA2B-E039BA306A2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0B8BFA4-2E15-4318-B7A9-DBDE801D0CF0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz_600p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB8CDE6-8052-40F7-950F-05329499A58A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DE5C7BF2-73A5-47F9-BAE5-903DDC73C5A5",
"versionEndIncluding": "7.0.1-5169",
"versionStartIncluding": "7.0.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E7E993C8-637F-423C-AD48-4627E2D53238",
"versionEndExcluding": "7.3.2-7010",
"versionStartIncluding": "7.1.1-7040",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D8B0C7A-FD65-47CA-A625-150A90EFA7A1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A69E000B-5806-46FD-A233-4E2CC9DD38D2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DF4A322-7CC7-4AB9-B10E-FFF34DF2182D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C15FED5-C48C-47CF-9645-0563D77883C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A884B1BB-F201-4C77-9F6E-B8A884DCD4C2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C3BA5A3-1160-4793-A8D6-40B9D264BCC4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6739DEA3-06FF-4FEB-9931-0DB27F63B70E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0250EDF9-0AEF-4711-8EF6-D447CF48BCAF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7D6CF3CF-256C-4C04-8BDF-B16398CD0459",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsv_270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2ABC8D8-2943-4073-9568-E87961A18998",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsv_470:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F57D527-AA3F-45E9-9BCE-6F76691066B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsv_870:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5ECCCF0-A5D8-42A8-8EC1-D12B49B1124A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A7B4459A-2B44-4C93-8EB5-E1FFAB7FAE8D",
"versionEndExcluding": "8.2.0-8009",
"versionStartIncluding": "8.0.0-8035",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:nsa_2800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "559FE8B8-E5E1-4E74-98AF-79AF0ECF9064",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_3800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ED8014A-C7A4-4624-8D50-A9844871C1B6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_4800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BDD4AB6-878B-41BE-BA33-6A2ECE2BC85B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:nsa_5800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D28BF416-D019-438B-954E-FB94697DC011",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56EC904E-4FCA-4B35-B188-639AE688DD14",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz280w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B1618BE-A465-4E2F-BB7F-79E0AA930B1C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83B9556B-0A33-4A27-B9E2-00F47969A566",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz380w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72D94F4D-CEC8-473B-A49C-466F6F7274D3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz480:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCFE3403-6A5B-4735-9248-99297A2E4461",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAEE386F-5FE4-4F21-AD34-33B862AAD1CC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz680:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE6BC579-21A1-4C2F-B655-73B14C3409A7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:sonicwall:tz80:-:*:*:*:*:*:*:*",
"matchCriteriaId": "129CC10F-E822-4BF7-9EB5-0D702020CB0C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A post-authentication Path Traversal vulnerability in SonicOS allows an attacker to interact with usually restricted services."
}
],
"id": "CVE-2026-0205",
"lastModified": "2026-05-05T16:12:02.093",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 4.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-04-29T17:16:40.480",
"references": [
{
"source": "PSIRT@sonicwall.com",
"tags": [
"Vendor Advisory"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2026-0004"
}
],
"sourceIdentifier": "PSIRT@sonicwall.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-35"
}
],
"source": "PSIRT@sonicwall.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…