The vulnerability, classified under CWE-59 (Improper Link Resolution Before File Access), affects both 32-bit and 64-bit versions of the client up to version 12.4.3.283.
The vulnerability arises from improper link resolution, where the software fails to adequately validate file names before accessing them.
Specifically, the client does not prevent a filename from identifying a symbolic link or shortcut that could resolve to an unintended or unauthorized resource.
This flaw allows a local attacker with low privileges to craft malicious links, leading to the overwriting of arbitrary files on the system, potentially causing denial of service or file corruption.
| Advisory ID | CVE ID | CWE ID | CVSS v3 Base Score | CVSS Vector | Affected Versions | Fixed Version |
|---|---|---|---|---|---|---|
| SNWLID-2025-0007 | CVE-2025-32817 | CWE-59 | 6.1 (Medium) | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H | 12.4.3.283 and prior | 12.4.3.298 and later |
CVSS Vector Breakdown:
The CVSS base score for this vulnerability is 6.1, indicating a medium severity risk.
The exploit prediction scoring system (EPSS) estimates a low likelihood (0.01%) of exploitation in the next 30 days.
However, if exploited, attackers could overwrite critical files, leading to service disruptions or data corruption.
Notably, this vulnerability does not impact confidentiality but poses significant risks to system integrity and availability.
There is currently no workaround for this vulnerability.
SonicWall has released a patched version, 12.4.3.298, which addresses the issue.
Users of affected versions are strongly advised to upgrade to the latest version immediately to mitigate potential risks.
It is important to note that only the Windows client is vulnerable.
SonicWall Connect Tunnel clients for Linux and Mac are not affected by CVE-2025-32817.
| Platform | Affected Versions | Fixed Version |
|---|---|---|
| Windows (32/64) | 12.4.3.283 and prior | 12.4.3.298 and later |
| Linux/Mac | Not affected | Not affected |
Organizations using SonicWall Connect Tunnel Windows Client should prioritize updating to the fixed version to prevent exploitation of this improper link resolution vulnerability.
Prompt patching is essential to maintain the integrity and availability of critical systems.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates
The post Critical Flaw in SonicWALL Connect Tunnel Enables DoS Attacks appeared first on Cyber Security News.
Today's links Ada Palmer's "Inventing the Renaissance": A tour-de-force, a magnum opus, a work of…
Future The People Do Not Yearn for AutomationNilay Patel | The Verge “Not everything about…
The global energy industry has long depended on seismic data to locate oil and gas…
Artificial intelligence is quietly transforming every corner of modern industry. From predictive maintenance in heavy…
Additive manufacturing has always lived in a bit of a gray area. Some see it…
The global energy industry has long depended on seismic data to locate oil and gas…
This website uses cookies.