سامي
سامي الغامدي
مستشار Fyntralink · متاح الآن
مدعوم بالذكاء الاصطناعي · Fyntralink

SonicWall SonicOS Trio (CVE-2026-0204/0205/0206) Threatens Saudi Bank Perimeters

Three newly disclosed SonicOS vulnerabilities — including a CVSS 8.0 access-control bypass — put SonicWall Gen6/7/8 firewalls at risk across Saudi banking perimeters. Here is the SAMA CSCC remediation playbook.

F
FyntraLink Team

SonicWall has issued an urgent advisory for three SonicOS vulnerabilities — CVE-2026-0204, CVE-2026-0205, and CVE-2026-0206 — affecting Gen6, Gen7, and Gen8 firewalls deployed across branch networks, data centers, and DR sites. For Saudi banks operating under SAMA CSCC, the perimeter is a Tier-1 control surface, and an unpatched SonicOS device is now an open invitation to lateral movement and policy tampering.

Anatomy of the SonicOS Vulnerability Trio

The headline flaw, CVE-2026-0204, is an improper access-control weakness rated CVSS 8.0. An attacker on an adjacent network can bypass weak authentication checks and reach sensitive management-plane functions without valid credentials, effectively handing over administrative control of the firewall. CVE-2026-0205 is a path-traversal bug that allows an attacker to break out of restricted directories and interact with services that should be off-limits. CVE-2026-0206 is a stack-based buffer overflow that can be triggered remotely, crashing the device and producing a denial-of-service condition that disrupts SSL-VPN, branch routing, and DMZ segmentation simultaneously.

Why SonicWall Edge Devices Are a High-Value Target

SonicWall appliances frequently sit between bank branches, ATM networks, and core banking VLANs. They terminate SSL-VPN tunnels for remote engineers, broker traffic to outsourced SOC providers, and enforce east-west segmentation between PCI-DSS scoped zones and corporate IT. Compromise of a single firewall typically yields three things at once: management credentials reusable across the fleet, the ability to rewrite NAT and ACL policies to silently redirect traffic, and a stable foothold inside the trusted zone where EDR coverage is often thinner than on endpoints. Threat actors including Akira, Qilin, and Mora_001 have repeatedly weaponized firewall flaws of this profile within days of disclosure.

Affected Versions and Patch Levels

The three CVEs affect SonicOS firmware up to 6.5.5.1-6n on Gen6, 7.0.1-5169 and 7.3.1-7013 on Gen7, and 8.1.0-8017 on Gen8. Saudi banks running TZ, NSa, NSsp, or virtual NSv appliances at any of these levels are in scope. Patched firmware is available from the SonicWall PSIRT portal, and the vendor has explicitly recommended disabling HTTP/HTTPS-based firewall management on all interfaces, disabling SSL-VPN services where feasible, and restricting management to SSH from a hardened jump host until firmware deployment is complete.

Impact on SAMA-Regulated Saudi Financial Institutions

Under the SAMA Cyber Security Framework and CSCC, perimeter and network security controls (CSCC 3.3 and 3.5) require banks to enforce strong authentication on management interfaces, segregate management networks, and apply critical patches within defined SLAs — typically 14 days for high-severity issues and faster for actively targeted vulnerabilities. NCA ECC subdomain 2-5 (Networks Security) and 2-3 (Information System and Information Processing Facilities Protection) impose parallel obligations on the wider Saudi market. Failure to patch a publicly disclosed CVSS 8.0 firewall flaw within the SAMA window is reportable as a control deficiency in the next SAMA Cyber Maturity assessment, and any breach traced back to it triggers PDPL Article 20 incident-notification timelines through SDAIA.

Remediation Playbook for Saudi Banks

  1. Run an immediate inventory query across NMS and CMDB for SonicWall Gen6/Gen7/Gen8 devices, including remote-branch and DR units, and tag each with current SonicOS firmware.
  2. Apply the SonicWall fixed firmware (post 6.5.5.1-6n, 7.0.1-5169, 7.3.1-7013, 8.1.0-8017) through staged deployment — start with non-production and DR pairs, validate failover, then push to production.
  3. If patching cannot be completed within 24–48 hours, implement the SonicWall PSIRT workarounds: disable HTTP/HTTPS management on WAN and untrusted interfaces, disable SSL-VPN where alternatives exist, and restrict admin access to SSH from a privileged access workstation only.
  4. Rotate all SonicOS administrative credentials, local accounts, and any shared service-account passwords. Audit configuration backups for unauthorized changes since April 2026.
  5. Hunt in SIEM for indicators of exploitation: unusual administrative logins from internal subnets, configuration export events, new VPN policies, and unexplained crashes or reboots in SonicOS syslog. Map findings to MITRE ATT&CK T1190 and T1133.
  6. Update the SAMA Cyber Threat Intelligence register and inform the bank's Cyber Risk Committee with a structured 1-pager covering exposure, remediation status, and residual risk.

Conclusion

The SonicOS trio is not a theoretical risk. Adjacent-network access bypass, path traversal, and remote DoS in the same patch cycle give attackers a flexible toolkit against the very devices Saudi banks rely on for SAMA-aligned segmentation and remote access. Treat this as a 24-hour patch event, document the actions in your CSCC evidence repository, and validate that compensating controls survive failover scenarios.

Is your organization prepared? Contact Fyntralink for a complimentary SAMA Cyber Maturity Assessment focused on perimeter and network security controls.