The TZ80:
Beginning with SonicOS 8.0.0, these SonicPoint devices are no longer supported:
The platform-specific version for this unified release is the same:
| TZ Series | Firmware Version | NSa Series | Firmware Version |
|---|---|---|---|
| TZ80 | 8.2.0-8009 | NSa 2800 | 8.2.0-8009 |
| TZ280 | 8.2.0-8009 | NSa 3800 | 8.2.0-8009 |
| TZ280P | 8.2.0-8009 | NSa 4800 | 8.2.0-8009 |
| TZ280W | 8.2.0-8009 | NSa 5800 | 8.2.0-8009 |
| TZ380 | 8.2.0-8009 | NSa 6800 | 8.2.0-8009 |
| TZ380W | 8.2.0-8009 | ||
| TZ480 | 8.2.0-8009 | ||
| TZ580 | 8.2.0-8009 | ||
| TZ680 | 8.2.0-8009 |
Support for customizing guest login pages using external web servers with the CGI mechanism has been deprecated. This functionality will no longer be enhanced, and customers are advised to migrate to the supported API‑based guest login customization mechanism.
For migration guidance and additional details, refer to the following Knowledge Base article: Deprecation of CGI-Based Guest Login Page Customization.
Credential Auditor
SonicOS 8.2.0 supports Credential Auditor, a built-in security feature designed to strengthen password protection. It automatically checks user credentials against known lists of compromised passwords, flags any matches, and enables administrators to take immediate action such as issuing warnings or enforcing password changes. This capability is included at no additional cost, with no extra SKUs or products required. Credential Auditor provides customers and partners with a simple, proactive way to manage credential risks, further enhancing SonicWall’s integrated, easy-to-use.
Enhanced Security Default
Updated OpenSSH library to the latest stable version.
Improved Signature Download Security
Signature downloads via proxy now use HTTPS (port 443), ensuring the secure transmission of update files in proxy environments.
Support for Bearer Token Validation for Non‑GUI API Sessions
The Two‑Factor and Bearer Token Authentication option has been renamed to Non‑GUI Management Login Bearer Token Session Check.
This security option introduces bearer token validation for non‑GUI (API‑only) sessions, enhancing authentication control for API access.
Key Details:
For more information and configuration details, refer to the following Knowledge Base article: Support for Bearer Token Validation for Non GUI API Sessions.
This maintenance release also resolves previously reported issues.
For more information, refer to the SonicOS 8 Migration Requirements Reference Guide.
|
Issue ID |
Description |
|---|---|
| GEN8-6895 | Post-authentication Stack-based Buffer Overflow vulnerability (SNWLID-2026-0004). |
| GEN8-12981 | Improper Access Control Vulnerability (SNWLID-2026-0004). |
| GEN8-13158 | Post-Authentication Path Traversal Vulnerability (SNWLID-2026-0004). |
|
GEN8-13779 |
Unexpected audit log Interface LAN/DMZ L2 Bridged Mode: VLAN Filtering Mode reported when editing interfaces. |
|
GEN8-14136 |
Port redundancy could be configured on incompatible interfaces on NSA 2800 and was removed after reboot. |
|
GEN8-14145 |
High Availability could not be established due to admin sync fail. |
|
GEN8-14180 |
Log priority changed when creating a configuration file for NSA3800 from NSA3600 using the Migration App on NSM. |
|
GEN8-14218 |
TOTP not working for NetExtender when using LDAP users. |
|
GEN8-14427 |
Post-authentication stack-based buffer overflow (SNWLID-2026-0001). |
|
GEN8-14444 |
Default HTTPS management NAT rule on NSA 2700 returns to top priority after reboot and firmware upgrade. |
|
GEN8-14898 |
Certain configuration of SSO Terminal Service Agent causes TZ670 device to reboot after upgrade. |
|
Issue ID |
Description |
|---|---|
|
GEN8-13375 |
Virus, Spyware, and IPS cannot be detected when downloading via DPI-SSH from a Windows client. |
|
GEN8-14436 |
Packets from Layer2 LAG Interface to WAN are dropped and not forwarded. |
|
GEN8-14510 |
Clicking clear database on Policy → DNS Security → Reports displays API endpoint is incomplete. |
|
GEN8-14580 |
Restrict access until password change is not editable for local users. |
|
GEN8-14795 |
X6 OSPF cannot be set to Passive mode or changed back to Disabled. |
|
GEN8-14852 |
BWM action objects are missing for HTTP Client policy type in App rules. |
|
GEN8-14881 |
GUI keeps loading when changing All to Default on Device → Users → Partitions → Partitions Selection Policies. |
Not Applicable.