5.3
CVE-2025-40605
- EPSS 0.04%
- Veröffentlicht 20.11.2025 12:19:17
- Zuletzt bearbeitet 12.12.2025 15:43:42
- Quelle PSIRT@sonicwall.com
- CVE-Watchlists
- Unerledigt
A Path Traversal vulnerability has been identified in the Email Security appliance allows an attacker to manipulate file system paths by injecting crafted directory-traversal sequences (such as ../) and may access files and directories outside the intended restricted path.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Sonicwall ≫ Email Security Appliance 5000 Firmware Version <= 10.0.33.8195
Sonicwall ≫ Email Security Appliance 5050 Firmware Version <= 10.0.33.8195
Sonicwall ≫ Email Security Appliance 7000 Firmware Version <= 10.0.33.8195
Sonicwall ≫ Email Security Appliance 7050 Firmware Version <= 10.0.33.8195
Sonicwall ≫ Email Security Appliance 9000 Firmware Version <= 10.0.33.8195
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.133 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
CWE-23 Relative Path Traversal
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.