Risk | Low |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2025-23008 CVE-2025-23009 CVE-2025-23010 |
CWE-ID | CWE-269 CWE-250 CWE-59 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
NetExtender for Windows Client/Desktop applications / Other client software |
Vendor | SonicWall |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU107327
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-23008
CWE-ID:
CWE-269 - Improper Privilege Management
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper privilege management. A local user can modify application's configuration and escalate privileges on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsNetExtender for Windows: 9.0.0.274 - 10.3.1
CPE2.3https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0006
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107328
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-23009
CWE-ID:
CWE-250 - Execution with Unnecessary Privileges
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to execution with unnecessary privileges. A local user can delete arbitrary files on the system with elevated permissions and escalate privileges on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsNetExtender for Windows: 9.0.0.274 - 10.3.1
CPE2.3https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0006
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107329
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-23010
CWE-ID:
CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insecure link following. A local user can manipulate file paths and perform a denial of service attack against the application.
MitigationInstall updates from vendor's website.
Vulnerable software versionsNetExtender for Windows: 9.0.0.274 - 10.3.1
CPE2.3https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0006
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.