Multiple vulnerabilities in SonicWall NetExtender for Windows



Risk Low
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2025-23008
CVE-2025-23009
CVE-2025-23010
CWE-ID CWE-269
CWE-250
CWE-59
Exploitation vector Local
Public exploit N/A
Vulnerable software
NetExtender for Windows
Client/Desktop applications / Other client software

Vendor SonicWall

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Improper privilege management

EUVDB-ID: #VU107327

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-23008

CWE-ID: CWE-269 - Improper Privilege Management

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper privilege management. A local user can modify application's configuration and escalate privileges on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

NetExtender for Windows: 9.0.0.274 - 10.3.1

CPE2.3 External links

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0006


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Execution with unnecessary privileges

EUVDB-ID: #VU107328

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-23009

CWE-ID: CWE-250 - Execution with Unnecessary Privileges

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to execution with unnecessary privileges. A local user can delete arbitrary files on the system with elevated permissions and escalate privileges on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

NetExtender for Windows: 9.0.0.274 - 10.3.1

CPE2.3 External links

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0006


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Link following

EUVDB-ID: #VU107329

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-23010

CWE-ID: CWE-59 - Improper Link Resolution Before File Access ('Link Following')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to insecure link following. A local user can manipulate file paths and perform a denial of service attack against the application.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

NetExtender for Windows: 9.0.0.274 - 10.3.1

CPE2.3 External links

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0006


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###