SonicOS 7.0.1 Release Notes

Version 7.0.1-5165 January 2025

January 2025

This version of SonicOS 7.0.1 is a maintenance release for existing platforms to resolve issues found in previous releases.

SonicOS 7.0.1 firmware should be only used by existing customers who are running SonicOS 7.0.1-5151 or earlier. Do not downgrade to this SonicOS 7.0.1-based firmware if you are already running a version of SonicOS 7.1.1.

Compatibility and Installation Notes

  • Most popular browsers are supported, but Google Chrome is preferred for the real-time graphics display on the Dashboard.
  • A MySonicWall account is required.

Supported Platforms

The platform-specific version for this unified release is the same:

Platform Firmware Version
TZ Series 7.0.1-5165
NSa Series 7.0.1-5165
NSv Series 7.0.1-5165
NSsp Series 7.0.1-5165
  • TZ270 / TZ270W
  • TZ370 / TZ370W
  • TZ470 / TZ470W
  • TZ570 / TZ570W
  • TZ570P
  • TZ670
  • NSa 2700
  • NSa 3700
  • NSa 4700
  • NSa 5700
  • NSa 6700
  • NSv 270
  • NSv 470
  • NSv 870
  • NSsp 10700
  • NSsp 11700
  • NSsp 13700
  • NSsp 15700

SonicOS NSv deployments are supported on the following platforms:

  • AWS (BYOL and PAYG)
  • Microsoft Azure (BYOL)
  • VMware ESXi
  • Microsoft Hyper-V
  • Linux KVM

Resolved Issues

Issue ID Issue Description
GEN7-50399 Integer-Based Buffer Overflow Vulnerability In SonicOS via IPSec (SNWLID-2024-0013)
GEN7-51451 SonicOS SSH Management Server-Side Request Forgery Vulnerability (SNWLID-2025-0003)
GEN7-51456 SSL-VPN MFA Bypass Due to UPN and SAM Account Handling in Microsoft Active Directory (SNWLID-2025-0001)
GEN7-51457 SonicOS Post-authentication arbitrary file read vulnerability (SNWLID-2025-0004)
GEN7-51458 SonicOS Post-authentication format string vulnerability (SNWLID-2025-0004)
GEN7-51459 SonicOS Post-authentication Stack-based buffer overflow vulnerability (SNWLID-2025-0004)

Additional References

GEN7-51454, GEN7-50035