This version of SonicOS 7.1.3 is a feature release for existing platforms and also resolves issues found in previous releases.
The platform-specific version for this unified release is the same:
| Platform | Firmware Version |
|---|---|
| TZ Series | 7.1.3-7015 |
| NSa Series | 7.1.3-7015 |
| NSsp Series | 7.1.3-7015 |
|
|
|
| Issue ID | Issue Description |
|---|---|
| GEN7-41593 | If LACP is enabled when upgrading a High Availability pair, High Availability should be disabled and each firewall must be upgraded separately. |
| GEN7-45252 |
NSsp 15700 only. A Standby firewall may fail to restart from
uploaded firmware with the error After forcing a failover for the firewall, the upgrade will be successful. |
| GEN7-47587 | NSsp 15700 only: On firewalls configured for Policy Mode, the highest priority rule is applied after a 3-way handshake instead of on the first packet when there is a lower priority rule that is more specific than a higher priority rule. |
| GEN7-48603 | In an High Availability configuration with external SonicWall-managed switches using a Portshield interface, the Spanning-Tree port status does not change on the switches after an High Availability failover. |
| GEN7-48727 | Inbound Unique Local Address (ULA) access rules are not used. |
| GEN7-49131 | Configuring DDNS with dyn.com displays Network error
in the status. This was caused by an incorrect and redundant hostname
check for the certificate for the DDNS server. |
| GEN7-49423 | SSL VPN connections may intermittently be dropped preventing users from being able to successfully connect. |
| GEN7-49738 | Integer-Based Buffer Overflow Vulnerability in SonicOS via IPSec (SNWLID-2024-0013) |
| GEN7-49761 | Under some conditions, the highest priority rule is applied after 3-way handshake instead of when the first packet is processed. |
| GEN7-49766 | Generation of a Capture Threat Assessment report fails if the Capture Threat Assessment report is generated containing a custom logo that is larger than 64K. |
| GEN7-49782 | When creating configuration on the Cloud Secure Edge > Access Setting page and adding a Private CIDR object under the connector, the zone assignment dropdown list does not display all the available zones. |
| GEN7-49875 | Fan Failure Alerts (576) are reported in system logs after upgrading to SonicOS 7.1.1-7058. |
| GEN7-49949 | When importing preferences with authentication partitioning, authentication methods keep their default values rather than those provided in the saved configuration. |
| GEN7-49988 | Device is sending system logs to Global Management System (GMS) through the WAN instead of through the VPN when the Management Mode is set to the existing tunnel. |
| GEN7-49997 | The captive portal does not work for local users when using RADIUS authentication. |
| GEN7-50120 | The VPN Policies page is not displaying the Gateway IP and remote networks after importing settings. |
| GEN7-50133 | The Address Object in the Route, Access Rule, and NAT policy is changed after upgrading to 7.1.2-7019 if the address object name contains a ' or ". |
| GEN7-50173 | Enabling TLS 1.3 Hybridized Kyber Support breaks the App Rule action of HTTP Redirect post DPI-SSL Server decryption. |
| GEN7-50175 | The firewall restarts multiple times after upgrading to 7.1.2-7019. |
| GEN7-50395 | After enabling Authentication Partitioning on the Users > Settings page, the Separate settings per authentication partition option cannot be disabled. |
| GEN7-50543 | Unable to access the networks starting with the IP address 172.x.x.x after
connecting using the Cloud Secure Edge client. |
| GEN7-50605 | RADIUS Protocol Forgery Vulnerability (Blast-RADIUS) (SNWLID-2024-0014) |
| GEN7-50741 | SonicOS Post-authentication Stack-based buffer overflow vulnerability (SNWLID-2025-0004) |
| GEN7-50742 | SonicOS Post-authentication format string vulnerability (SNWLID-2025-0004) |
| GEN7-50743 | SonicOS Post-authentication arbitrary file read vulnerability (SNWLID-2025-0004) |
| GEN7-50896 | SSL-VPN MFA Bypass Due to UPN and SAM Account Handling in Microsoft Active Directory (SNWLID-2025-0001) |
| GEN7-51230 | SonicOS SSL VPN Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) (SNWLID-2025-0003) |
| GEN7-51231 | SonicOS SSL VPN Authentication Bypass Vulnerability (SNWLID-2025-0003) |
| GEN7-51232 | SonicOS SSH Management Server-Side Request Forgery Vulnerability (SNWLID-2025-0003) |
| Issue ID | Issue Description |
|---|---|
| GEN7-49808 | When creating a configuration on the Cloud Secure Edge > Access Settings page, the error You must associate at least one member object to this group is displayed when attempting to delete any address object from the Default CSE Allowed CIDRs group if it contains an FQDN object. |
| GEN7-50446 | The Setup Guide fails with error: Script is missing one or more "exit" command(s) if LTE/5G for the module device type is selected. |
| GEN7-51032 | When Wireless LAN is disabled, the Wireless Controller Mode is not changed to Non-Wireless automatically. |
| GEN7-51273 | IPv6 ULA redirection may fail. |
| GEN7-51389 |
Address Object: Netmask is shown incorrectly in the Network Security Manager (NSM) user interface after the C&D.Network type with
Network as |
| GEN7-51561 | Cannot access The IPv6 HTTPS server when Client DPI SSL is enabled. |
GEN7-43599, GEN7-43661, GEN7-44786, GEN7-47520, GEN7-48190, GEN7-48273, GEN7-48293, GEN7-48628, GEN7-48835, GEN7-48859, GEN7-48888, GEN7-48979, GEN7-48989, GEN7-49062, GEN7-49127, GEN7-49248, GEN7-49267, GEN7-49304, GEN7-49336, GEN7-49350, GEN7-49376, GEN7-49523, GEN7-49525, GEN7-49571, GEN7-49628, GEN7-49662, GEN7-49688, GEN7-49696, GEN7-49742, GEN7-49771, GEN7-49799, GEN7-49807, GEN7-49827, GEN7-49844, GEN7-49857, GEN7-49858, GEN7-49877, GEN7-49907, GEN7-49961, GEN7-50030, GEN7-50048, GEN7-50067, GEN7-50072, GEN7-50074, GEN7-50075, GEN7-50092, GEN7-50122, GEN7-50124, GEN7-50146, GEN7-50147, GEN7-50183, GEN7-50187, GEN7-50188, GEN7-50189, GEN7-50207, GEN7-50231, GEN7-50245, GEN7-50266, GEN7-50275, GEN7-50306, GEN7-50314, GEN7-50362, GEN7-50369, GEN7-50396, GEN7-50422, GEN7-50433, GEN7-50524, GEN7-50533, GEN7-50535, GEN7-50537, GEN7-50596, GEN7-50599, GEN7-50601, GEN7-50623, GEN7-50635, GEN7-50670, GEN7-50693, GEN7-50737, GEN7-50746, GEN7-50790, GEN7-50821, GEN7-50846, GEN7-50875, GEN7-50891, GEN7-50928, GEN7-50933, GEN7-50964, GEN7-50999, GEN7-51170, GEN7-51195, GEN7-51200, GEN7-51265