CVE-2026-3439
Medium
|4.9Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows a remote attacker to crash a SonicWall firewall, potentially disrupting network security and access. It requires the attacker to be authenticated, meaning they need valid credentials to exploit the flaw.
Technical Description
A post-authentication Stack-based Buffer Overflow vulnerability in SonicOS certificate handling allows a remote attacker to crash a firewall.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactNone
Availability ImpactHigh
ScopeUnchanged
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$655($500-$1K)
Vendor Response
Grade APatched in 1 day
Quick Information
Published
Mar 4, 2026
about 1 month ago
Last Modified
Mar 5, 2026
about 1 month ago
Vendor
sonicwall
Product
sonicos