Cyber Posture

CVE-2024-12805

High

Published: 09 January 2025

Published
09 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0108 78.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-12805 is a high-severity Use of Externally-Controlled Format String (CWE-134) vulnerability in Sonicwall (inferred from references). Its CVSS base score is 7.2 (High).

Operationally, ranked in the top 22.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-11 (Error Handling).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

preventrecover

Directly mitigates the CVE by requiring timely identification, reporting, and patching of the known format string flaw in the SonicOS management interface.

prevent

Requires validation of post-authentication inputs to the management interface, directly preventing format string exploitation attempts.

prevent

Mandates secure error and exception handling to avoid crashes or information disclosure from malformed format strings in the management component.

NVD Description

A post-authentication format string vulnerability in SonicOS management allows a remote attacker to crash a firewall and potentially leads to code execution.

Deeper analysisAI

CVE-2024-12805 is a post-authentication format string vulnerability (CWE-134) in the SonicOS management interface of SonicWall firewalls. Published on January 9, 2025, it enables a remote attacker to crash the firewall and potentially achieve code execution. The issue carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating high impact on confidentiality, integrity, and availability.

Exploitation requires high privileges (PR:H), targeting authenticated administrative users with network access to the management interface. An attacker can remotely trigger the format string flaw with low attack complexity and no user interaction, resulting in a denial-of-service condition by crashing the firewall. Successful exploitation may escalate to arbitrary code execution within the management component.

SonicWall has published details on the vulnerability, including mitigation guidance, in PSIRT advisory SNWLID-2025-0004 at https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0004.

Details

CWE(s)

Affected Products

Sonicwall
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-46121Shared CWE-134
CVE-2026-22190Shared CWE-134
CVE-2024-45324Shared CWE-134
CVE-2026-3509Shared CWE-134
CVE-2026-33210Shared CWE-134
CVE-2025-30269Shared CWE-134
CVE-2025-68648Shared CWE-134
CVE-2025-64157Shared CWE-134
CVE-2025-40600Shared CWE-134
CVE-2025-55298Shared CWE-134

References