CVE-2026-0204
Published: 29 April 2026
Summary
CVE-2026-0204 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Sonicwall Sonicos. Its CVSS base score is 8.0 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 0.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for access to management interface functions, directly countering flaws in SonicOS access control mechanisms.
Limits and documents permitted actions without authentication, mitigating CWE-306 missing authentication for critical management functions.
Restricts privileges to the minimum necessary, addressing CWE-1390 weak access permissions in SonicOS management interfaces.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing authentication on management interface (CWE-306) directly enables exploitation of the exposed remote management service or application for unauthorized access.
NVD Description
A vulnerability in the access control mechanism of SonicOS may allow certain management interface functions to be accessible under specific conditions.
Deeper analysisAI
CVE-2026-0204 is a vulnerability in the access control mechanism of SonicOS, the operating system used in SonicWall firewalls and security appliances. It may allow certain management interface functions to be accessible under specific conditions. The issue is linked to CWE-306 (Missing Authentication for Critical Function) and CWE-1390 (Weak Access Permissions), with a CVSS v3.1 base score of 8.0 (AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The vulnerability was published on 2026-04-29.
The attack scenario requires an attacker with adjacent network access (AV:A) and low complexity (AC:L), needing no privileges (PR:N) but relying on user interaction (UI:R). Successful exploitation enables high-impact effects on confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged scope (S:U), potentially granting unauthorized access to sensitive management interface functions.
Mitigation details are provided in the SonicWall PSIRT advisory at https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2026-0004.
Details
- CWE(s)