{"id":17752,"date":"2025-11-24T15:49:17","date_gmt":"2025-11-24T15:49:17","guid":{"rendered":"https:\/\/lite14.net\/blog\/?p=17752"},"modified":"2025-11-24T15:49:17","modified_gmt":"2025-11-24T15:49:17","slug":"sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances","status":"publish","type":"post","link":"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/","title":{"rendered":"SonicWall Releases Patches for High-Severity Vulnerabilities in Firewalls and Email Security Appliances"},"content":{"rendered":"<p>&nbsp;<\/p>\n<hr \/>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#_Whats_Going_On_%E2%80%94_Key_Details\" >\u00a0What\u2019s Going On \u2014 Key Details<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#1_The_Vulnerabilities\" >1. The Vulnerabilities<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#2_Affected_Products_Versions\" >2. Affected Products &amp; Versions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#3_Fixes_Recommendations\" >3. Fixes &amp; Recommendations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#4_Exploitation_Status_Risk\" >4. Exploitation Status &amp; Risk<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#5_Advisory_Disclosure\" >5. Advisory &amp; Disclosure<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#_Case_Studies_Scenarios\" >\u00a0Case Studies &amp; Scenarios<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#Case_Study_A_Enterprise_Network_Perimeter\" >Case Study A: Enterprise Network Perimeter<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#Case_Study_B_Email_Gateway_Protection_for_Virtualised_Mail_Environment\" >Case Study B: Email Gateway Protection for Virtualised Mail Environment<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#Case_Study_C_Managed_Service_Provider_MSP_Supporting_SMB_Customers\" >Case Study C: Managed Service Provider (MSP) Supporting SMB Customers<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#_Commentary_Insights\" >\u00a0Commentary &amp; Insights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#_Bottom_Line\" >\u00a0Bottom Line<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#_Case_Studies\" >\u00a0Case Studies<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#Case_Study_1_Enterprise_VPNFirewall_Deployment\" >Case Study 1: Enterprise VPN\/Firewall Deployment<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#Case_Study_2_Email_Security_Gateway_in_Virtualised_Environment\" >Case Study 2: Email Security Gateway in Virtualised Environment<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#Case_Study_3_Managed_Service_Provider_MSP_Covering_Multiple_SMB_Customers\" >Case Study 3: Managed Service Provider (MSP) Covering Multiple SMB Customers<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#_Commentary_Strategic_Insights\" >\u00a0Commentary &amp; Strategic Insights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#_Bottom_Line-2\" >\u00a0Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"_Whats_Going_On_%E2%80%94_Key_Details\"><\/span>\u00a0What\u2019s Going On \u2014 Key Details<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"1_The_Vulnerabilities\"><\/span>1. The Vulnerabilities<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>A remote, unauthenticated buffer\u2011overflow vulnerability (tracked as CVE\u20112025\u201140601) exists in the SonicOS SSLVPN service on Gen7 and Gen8 firewalls. It allows an attacker to cause a denial\u2011of\u2011service (DoS) \/ crash of the device. (<a title=\"New SonicWall SonicOS flaw allows hackers to crash firewalls\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-sonicwall-sonicos-flaw-allows-hackers-to-crash-firewalls\/?utm_source=chatgpt.com\">BleepingComputer<\/a>)<\/li>\n<li>Two additional flaws affect the Email Security appliance (models ES\u202f5000\/5050\/7000\/7050\/9000 and virtual deployments). These include CVE\u20112025\u201140604 (code execution via unverified root filesystem image) and CVE\u20112025\u201140605 (path traversal allowing unauthorized access). (<a title=\"SonicWall Patches High-Severity Flaws in Firewalls, Email Security ...\" href=\"https:\/\/www.securityweek.com\/sonicwall-patches-high-severity-flaws-in-firewalls-email-security-appliance\/?utm_source=chatgpt.com\">SecurityWeek<\/a>)<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"2_Affected_Products_Versions\"><\/span>2. Affected Products &amp; Versions<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>Firewalls (Gen7 hardware &amp; virtual; Gen8 hardware) are affected when SSLVPN service is enabled. Versions <strong>7.3.0\u20117012 and earlier<\/strong> (Gen7) and <strong>8.0.2\u20118011 and earlier<\/strong> (Gen8) are vulnerable. (<a title=\"SonicWall flags SSLVPN flaw allowing firewall crashes\" href=\"https:\/\/securityaffairs.com\/184967\/security\/sonicwall-flags-sslvpn-flaw-allowing-firewall-crashes.html?utm_source=chatgpt.com\">Security Affairs<\/a>)<\/li>\n<li>Email Security Appliances: version <strong>10.0.33.8195 and earlier<\/strong> are affected for the mentioned models. (<a title=\"SonicWall security advisory (AV25-774)\" href=\"https:\/\/www.cyber.gc.ca\/en\/alerts-advisories\/sonicwall-security-advisory-av25-774?utm_source=chatgpt.com\">Canadian Centre for Cyber Security<\/a>)<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"3_Fixes_Recommendations\"><\/span>3. Fixes &amp; Recommendations<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>SonicWall released patch versions: For firewalls: Gen7 \u2192 7.3.1\u20117013 and later; Gen8 \u2192 8.0.3\u20118011 and later. (<a title=\"New SonicWall SonicOS flaw allows hackers to crash firewalls\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-sonicwall-sonicos-flaw-allows-hackers-to-crash-firewalls\/?utm_source=chatgpt.com\">BleepingComputer<\/a>)<\/li>\n<li>For Email Security appliances: fixed in version <strong>10.0.34.8215<\/strong> (and 10.0.34.8223) and later. (<a title=\"SonicWall Patches Two Vulnerabilities in Email Security Appliances ...\" href=\"https:\/\/securityonline.info\/sonicwall-patches-two-vulnerabilities-in-email-security-appliances-including-code-execution-flaw-cve-2025-40604\/?utm_source=chatgpt.com\">Daily CyberSecurity<\/a>)<\/li>\n<li>If immediate patching isn\u2019t feasible, SonicWall advises:\n<ul>\n<li>Disable SSLVPN service or restrict access to trusted source IPs\/hosts. (<a title=\"New SonicWall SonicOS flaw allows hackers to crash firewalls\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-sonicwall-sonicos-flaw-allows-hackers-to-crash-firewalls\/?utm_source=chatgpt.com\">BleepingComputer<\/a>)<\/li>\n<li>For email appliances, maintain tight virtualization host access controls and ensure underlying storage is secure.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"4_Exploitation_Status_Risk\"><\/span>4. Exploitation Status &amp; Risk<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>No known public proof\u2011of\u2011concept (PoC) or confirmed active exploitation of CVE\u20112025\u201140601 at time of disclosure. (<a title=\"New SonicWall SonicOS flaw allows hackers to crash firewalls\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-sonicwall-sonicos-flaw-allows-hackers-to-crash-firewalls\/?utm_source=chatgpt.com\">BleepingComputer<\/a>)<\/li>\n<li>Because these are high\u2011severity flaws affecting critical security infrastructure (firewalls, email gateways), they carry significant risk if left unpatched.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"5_Advisory_Disclosure\"><\/span>5. Advisory &amp; Disclosure<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>The Canadian Cyber Centre issued advisory AV25\u2011774 on November\u202f20,\u202f2025, covering these vulnerabilities. (<a title=\"SonicWall security advisory (AV25-774)\" href=\"https:\/\/www.cyber.gc.ca\/en\/alerts-advisories\/sonicwall-security-advisory-av25-774?utm_source=chatgpt.com\">Canadian Centre for Cyber Security<\/a>)<\/li>\n<li>Security\u2011news platforms widely reported the patches and urged customers to act. (<a title=\"SonicWall Patches High-Severity Flaws in Firewalls, Email Security ...\" href=\"https:\/\/www.securityweek.com\/sonicwall-patches-high-severity-flaws-in-firewalls-email-security-appliance\/?utm_source=chatgpt.com\">SecurityWeek<\/a>)<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"_Case_Studies_Scenarios\"><\/span>\u00a0Case Studies &amp; Scenarios<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Case_Study_A_Enterprise_Network_Perimeter\"><\/span>Case Study A: Enterprise Network Perimeter<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>Scenario:<\/strong> A large enterprise uses SonicWall Gen8 firewalls with SSLVPN enabled for remote workforce access.<br \/>\n<strong>Risk:<\/strong> An attacker sends crafted input targeting the buffer overflow (CVE\u20112025\u201140601) and causes the firewall to crash, potentially taking down remote access for users and weakening the network perimeter.<br \/>\n<strong>Action:<\/strong> The enterprise patches to version 8.0.3\u20118011+, or temporarily disables SSLVPN and restricts access until patching is complete.<br \/>\n<strong>Outcome:<\/strong> The enterprise avoids business interruption and maintains secure remote access.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Case_Study_B_Email_Gateway_Protection_for_Virtualised_Mail_Environment\"><\/span>Case Study B: Email Gateway Protection for Virtualised Mail Environment<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>Scenario:<\/strong> A financial services firm uses SonicWall Email Security appliance on VMware. The system still runs version 10.0.33.8195.<br \/>\n<strong>Risk:<\/strong> Using CVE\u20112025\u201140604, an attacker with datastore access injects malicious root filesystem images, gaining persistent code execution. Or, using CVE\u20112025\u201140605 path traversal, attacker accesses sensitive logs or configuration files.<br \/>\n<strong>Action:<\/strong> Upgrade to 10.0.34.8215 (or 8223) immediately; audit virtualization host controls and storage access; restrict who can mount VMDKs or modify images.<br \/>\n<strong>Outcome:<\/strong> The firm reduces risk of gateway compromise and data exposure.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Case_Study_C_Managed_Service_Provider_MSP_Supporting_SMB_Customers\"><\/span>Case Study C: Managed Service Provider (MSP) Supporting SMB Customers<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>Scenario:<\/strong> An MSP manages SonicWall firewalls for multiple SMB clients, many of whom have not enabled SSLVPN.<br \/>\n<strong>Risk:<\/strong> Although SSLVPN might not be enabled, the firewall version remains vulnerable; the MSP may face multiple clients concurrently if an exploit emerges.<br \/>\n<strong>Action:<\/strong> The MSP issues patch notice to all clients, prioritises those with SSLVPN enabled, and schedules batch firmware updates across clients. Also implements temporary access restrictions until patch rollout completes.<br \/>\n<strong>Outcome:<\/strong> MSP avoids widespread incidents and maintains client trust.<\/p>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"_Commentary_Insights\"><\/span>\u00a0Commentary &amp; Insights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ol>\n<li><strong>Why These Flaws Matter<\/strong>\n<ul>\n<li>Firewalls and email\u2011security gateways sit at critical junctions of network defence. Vulnerabilities that allow remote DoS (firewalls) or code execution (email appliances) significantly increase opportunity for attackers.<\/li>\n<li>The fact that the firewall vulnerability is unauthenticated (no login required) elevates urgency.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Severity vs Exploitation Gap<\/strong>\n<ul>\n<li>While no active exploitation is reported yet, history shows that once a vendor discloses such flaws, threat actors rapidly craft exploits. Thus the \u201cwindow of risk\u201d between disclosure and patching is key.<\/li>\n<li>Organisations should treat this as high\u2011priority, even if no active exploit is known.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Critical Infrastructure &amp; Trust<\/strong>\n<ul>\n<li>SonicWall devices protect many enterprises, service providers, and SMBs. A compromise here can cascade into data breaches, ransomware incidents, service downtime, or reputational damage.<\/li>\n<li>The vendor\u2019s prompt patch release is good, but the underlying incident highlights the importance of timely firmware updates and the risks of delayed patching.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Recommended Best Practices<\/strong>\n<ul>\n<li>Maintain an accurate inventory of all SonicWall devices (hardware, virtual) and versions.<\/li>\n<li>Prioritise patching of devices with SSLVPN enabled and email gateway systems with virtualization storage exposures.<\/li>\n<li>Employ layered mitigations: restrict management access, disable unused services, enforce multi\u2011factor authentication, segment and monitor network traffic.<\/li>\n<li>Monitor for unusual device reboots, SSLVPN crashes, unexpected file system changes on email appliances.<\/li>\n<li>Integrate vendor advisories into the vulnerability management process; don\u2019t treat appliance firmware updates as low priority.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Vendor &amp; Broader Security Ecosystem<\/strong>\n<ul>\n<li>SonicWall\u2019s disclosure indicates the vendor is actively maintaining its PSIRT (Product Security Incident Response Team) and issuing advisories \u2014 a positive sign.<\/li>\n<li>However, the occurrence of high\u2011severity flaws in such core infrastructure shows that enterprises must assume this risk and have resilient patch and mitigation programs.<\/li>\n<li>Security teams should view firewall and email gateway firmware updates with the same urgency as OS or application patching.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"_Bottom_Line\"><\/span>\u00a0Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>SonicWall has released patches addressing <strong>high\u2011severity vulnerabilities<\/strong> in its Gen7\/Gen8 firewalls (SSLVPN DoS) and Email Security appliances (code execution \/ file access).<\/li>\n<li>The risk is significant due to remote, unauthenticated exposure and critical function of the devices.<\/li>\n<li>Organisations must <strong>patch immediately<\/strong>, or at minimum apply the recommended mitigations (disable\/limit SSLVPN; protect virtualization storage for email appliances).<\/li>\n<li>Delay in patching exposes networks to potential disruption, compromise, and service failure.<\/li>\n<li>Here are <strong>case\u2011studies and commentary<\/strong> on the recent patch release by SonicWall for high\u2011severity vulnerabilities in its firewalls and email security appliances.<br \/>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"_Case_Studies\"><\/span>\u00a0Case Studies<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Case_Study_1_Enterprise_VPNFirewall_Deployment\"><\/span>Case Study 1: Enterprise VPN\/Firewall Deployment<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>Scenario:<\/strong> A large enterprise uses SonicWall Gen7\/Gen8 firewalls to provide SSL\u202fVPN access for remote workers.<br \/>\n<strong>Vulnerability:<\/strong> A stack\u2011based buffer overflow (CVE\u20112025\u201140601) in the SonicOS SSLVPN service allows a remote, unauthenticated attacker to cause a denial\u2011of\u2011service (crash) of the firewall. (<a title=\"New SonicWall SonicOS flaw allows hackers to crash firewalls\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-sonicwall-sonicos-flaw-allows-hackers-to-crash-firewalls\/?utm_source=chatgpt.com\">BleepingComputer<\/a>)<br \/>\n<strong>Impact:<\/strong> If exploited, remote users would lose VPN connectivity; firewall services may stop responding, internal network access may be disrupted, and security monitoring could be impacted.<br \/>\n<strong>Response:<\/strong> SonicWall released patched versions (e.g., Gen7 \u2192 7.3.1\u20117013, Gen8 \u2192\u202f8.0.3\u20118011+) and advised administrators unable to patch immediately to disable SSLVPN service or restrict access to trusted IPs. (<a title=\"New SonicWall SonicOS flaw allows hackers to crash firewalls\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-sonicwall-sonicos-flaw-allows-hackers-to-crash-firewalls\/?utm_source=chatgpt.com\">BleepingComputer<\/a>)<br \/>\n<strong>Outcome:<\/strong> The organisation updated firmware, tested functionality, monitored for unusual restarts or crashes, and tightened remote\u2011access restrictions during the window before patching.<\/p>\n<hr \/>\n<h3><span class=\"ez-toc-section\" id=\"Case_Study_2_Email_Security_Gateway_in_Virtualised_Environment\"><\/span>Case Study 2: Email Security Gateway in Virtualised Environment<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>Scenario:<\/strong> A financial services firm uses a SonicWall Email Security Appliance (models ES\/7000\/9000 etc) deployed as a virtual appliance running on VMware.<br \/>\n<strong>Vulnerabilities:<\/strong><\/p>\n<ul>\n<li>CVE\u20112025\u201140604: Root filesystem image vulnerability enabling arbitrary code execution.<\/li>\n<li>CVE\u20112025\u201140605: Path traversal allowing unauthorized file access. (<a title=\"SonicWall tells customers to patch SonicOS flaw allowing hackers to crash firewalls\" href=\"https:\/\/www.techradar.com\/pro\/security\/sonicwall-tells-customers-to-patch-sonicos-flaw-allowing-hackers-to-crash-firewalls?utm_source=chatgpt.com\">TechRadar<\/a>)<br \/>\n<strong>Impact:<\/strong> A threat actor could gain persistence inside the appliance, access sensitive mail flow or logs, potentially pivot to internal networks.<br \/>\n<strong>Response:<\/strong> The firm upgraded the appliance to the patched version (10.0.34.8215\/8223 or later) and audited virtualization host access, storage image permissions, backup image integrity. (<a title=\"New SonicWall SonicOS flaw allows hackers to crash firewalls\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-sonicwall-sonicos-flaw-allows-hackers-to-crash-firewalls\/?utm_source=chatgpt.com\">BleepingComputer<\/a>)<br \/>\n<strong>Outcome:<\/strong> Reduced risk of appliance compromise through known vulnerabilities, strengthened secure configuration of mail gateway infrastructure.<\/li>\n<\/ul>\n<hr \/>\n<h3><span class=\"ez-toc-section\" id=\"Case_Study_3_Managed_Service_Provider_MSP_Covering_Multiple_SMB_Customers\"><\/span>Case Study 3: Managed Service Provider (MSP) Covering Multiple SMB Customers<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>Scenario:<\/strong> An MSP manages SonicWall firewalls and email gateways for dozens of small\u2011to\u2011medium businesses.<br \/>\n<strong>Challenge:<\/strong> Many SMB customers delay firmware updates due to concerns about compatibility or downtime.<br \/>\n<strong>Action:<\/strong> The MSP issued notifications to all clients with vulnerable SonicWall models, prioritised those with SSLVPN exposed and email gateways unpatched, scheduled batch firmware updates, and applied compensating controls (restrict remote access, disable SSLVPN where feasible).<br \/>\n<strong>Benefit:<\/strong> By proactively patching and mitigating across its client base, the MSP avoided widespread exposure and strengthened its service credibility.<\/p>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"_Commentary_Strategic_Insights\"><\/span>\u00a0Commentary &amp; Strategic Insights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ol>\n<li><strong>Criticality of Infrastructure Vulnerabilities<\/strong><br \/>\nThese vulnerabilities affect <em>firewalls<\/em> and <em>email gateways<\/em>\u2014two foundational components of network defence. A compromise or crash in either can lead to serious business disruption or breach.<br \/>\nThe firewall SSLVPN vulnerability (CVE\u20112025\u201140601) is particularly concerning because it allows unauthenticated remote access and causes device failure. (<a title=\"New SonicWall SonicOS flaw allows hackers to crash firewalls\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-sonicwall-sonicos-flaw-allows-hackers-to-crash-firewalls\/?utm_source=chatgpt.com\">BleepingComputer<\/a>)<\/li>\n<li><strong>Patch Timing &amp; Risk Exposure<\/strong><br \/>\nWhile no public proof\u2011of\u2011concept or active exploitation of CVE\u20112025\u201140601 was reported at the time of disclosure, the window between patch release and full deployment represents a high\u2011risk period. Attackers may scan exposed SSLVPN endpoints for unpatched devices. (<a title=\"SonicWall flags SSLVPN flaw allowing firewall crashes\" href=\"https:\/\/securityaffairs.com\/184967\/security\/sonicwall-flags-sslvpn-flaw-allowing-firewall-crashes.html?utm_source=chatgpt.com\">Security Affairs<\/a>)<br \/>\nOrganisations should treat this as a <strong>high priority<\/strong> patch event, not as routine maintenance.<\/li>\n<li><strong>Importance of Compensating Controls<\/strong><br \/>\nFor organisations that cannot immediately patch, SonicWall and security analysts advise disabling SSLVPN or restricting access from known, trusted networks only. (<a title=\"New SonicWall SonicOS flaw allows hackers to crash firewalls\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-sonicwall-sonicos-flaw-allows-hackers-to-crash-firewalls\/?utm_source=chatgpt.com\">BleepingComputer<\/a>)<br \/>\nThis demonstrates the value of layered security: even when a patch cannot be deployed instantly, mitigations can reduce exposure.<\/li>\n<li><strong>Virtualisation &amp; Mail Gateway Risk<\/strong><br \/>\nThe email appliance flaws (code execution, path traversal) highlight how virtualised devices can become entry points into broader infrastructure if not carefully managed. Access to root filesystem images or traversal vulnerabilities enable sophisticated attacks.<br \/>\nFirms should treat virtual appliance images, storage, and access rights with the same rigor as physical devices.<\/li>\n<li><strong>Vendor Transparency &amp; Security Posture<\/strong><br \/>\nSonicWall\u2019s prompt advisory and patch release reflect good practice (PSIRT disclosure, product security response). However, the occurrence of such vulnerabilities also underscores that even respected security vendors face serious risks in their firmware and services. Organisations cannot assume devices are inherently safe\u2014they must maintain patch discipline.<\/li>\n<li><strong>Operational Impact &amp; Business Continuity<\/strong><br \/>\nA firewall crash or email gateway compromise can cause network outages, remote access loss, mail flow interruption, or even data breach. It\u2019s not just a security risk\u2014it\u2019s a business continuity risk. Executive leadership and IT operations need to include these kinds of device vulnerabilities in risk assessments.<\/li>\n<\/ol>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"_Bottom_Line-2\"><\/span>\u00a0Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>SonicWall has released patches for <strong>high\u2011severity vulnerabilities<\/strong> in both its firewall (SSLVPN) and email security appliance product lines. (<a title=\"SonicWall tells customers to patch SonicOS flaw allowing hackers to crash firewalls\" href=\"https:\/\/www.techradar.com\/pro\/security\/sonicwall-tells-customers-to-patch-sonicos-flaw-allowing-hackers-to-crash-firewalls?utm_source=chatgpt.com\">TechRadar<\/a>)<\/li>\n<li>The vulnerabilities affect Gen7\/Gen8 firewalls (stack buffer overflow DoS) and email security appliances (RCE and path traversal).<\/li>\n<li>Immediate action is required: assess whether affected models are in your environment, patch firmware, apply mitigations if patching is delayed.<\/li>\n<li>Organisations should treat such firmware vulnerabilities as major security and business risks\u2014not low priority.<\/li>\n<li>A structured patching process, strong change management, and compensating controls are key to managing exposure.<\/li>\n<\/ul>\n<hr \/>\n<ul>\n<li><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr \/>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; \u00a0What\u2019s Going On \u2014 Key Details 1. The Vulnerabilities A remote, unauthenticated buffer\u2011overflow vulnerability (tracked as CVE\u20112025\u201140601) exists in the SonicOS SSLVPN service on&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[270,90],"tags":[],"class_list":["post-17752","post","type-post","status-publish","format-standard","hentry","category-digital-marketing","category-news-update"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SonicWall Releases Patches for High-Severity Vulnerabilities in Firewalls and Email Security Appliances - Lite14 Tools &amp; Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SonicWall Releases Patches for High-Severity Vulnerabilities in Firewalls and Email Security Appliances - Lite14 Tools &amp; Blog\" \/>\n<meta property=\"og:description\" content=\"&nbsp; \u00a0What\u2019s Going On \u2014 Key Details 1. The Vulnerabilities A remote, unauthenticated buffer\u2011overflow vulnerability (tracked as CVE\u20112025\u201140601) exists in the SonicOS SSLVPN service on...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/\" \/>\n<meta property=\"og:site_name\" content=\"Lite14 Tools &amp; Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-24T15:49:17+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2\"},\"headline\":\"SonicWall Releases Patches for High-Severity Vulnerabilities in Firewalls and Email Security Appliances\",\"datePublished\":\"2025-11-24T15:49:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/\"},\"wordCount\":1677,\"publisher\":{\"@id\":\"https:\/\/lite14.net\/blog\/#organization\"},\"articleSection\":[\"Digital Marketing\",\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/\",\"url\":\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/\",\"name\":\"SonicWall Releases Patches for High-Severity Vulnerabilities in Firewalls and Email Security Appliances - Lite14 Tools &amp; Blog\",\"isPartOf\":{\"@id\":\"https:\/\/lite14.net\/blog\/#website\"},\"datePublished\":\"2025-11-24T15:49:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/lite14.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SonicWall Releases Patches for High-Severity Vulnerabilities in Firewalls and Email Security Appliances\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lite14.net\/blog\/#website\",\"url\":\"https:\/\/lite14.net\/blog\/\",\"name\":\"Lite14 Tools &amp; Blog\",\"description\":\"Email Marketing Tools &amp; Digital Marketing Updates\",\"publisher\":{\"@id\":\"https:\/\/lite14.net\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lite14.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/lite14.net\/blog\/#organization\",\"name\":\"Lite14 Tools &amp; Blog\",\"url\":\"https:\/\/lite14.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png\",\"contentUrl\":\"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png\",\"width\":191,\"height\":178,\"caption\":\"Lite14 Tools &amp; Blog\"},\"image\":{\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/lite14.net\/blog\"],\"url\":\"https:\/\/lite14.net\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SonicWall Releases Patches for High-Severity Vulnerabilities in Firewalls and Email Security Appliances - Lite14 Tools &amp; Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/","og_locale":"en_US","og_type":"article","og_title":"SonicWall Releases Patches for High-Severity Vulnerabilities in Firewalls and Email Security Appliances - Lite14 Tools &amp; Blog","og_description":"&nbsp; \u00a0What\u2019s Going On \u2014 Key Details 1. The Vulnerabilities A remote, unauthenticated buffer\u2011overflow vulnerability (tracked as CVE\u20112025\u201140601) exists in the SonicOS SSLVPN service on...","og_url":"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/","og_site_name":"Lite14 Tools &amp; Blog","article_published_time":"2025-11-24T15:49:17+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#article","isPartOf":{"@id":"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/"},"author":{"name":"admin","@id":"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2"},"headline":"SonicWall Releases Patches for High-Severity Vulnerabilities in Firewalls and Email Security Appliances","datePublished":"2025-11-24T15:49:17+00:00","mainEntityOfPage":{"@id":"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/"},"wordCount":1677,"publisher":{"@id":"https:\/\/lite14.net\/blog\/#organization"},"articleSection":["Digital Marketing","News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/","url":"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/","name":"SonicWall Releases Patches for High-Severity Vulnerabilities in Firewalls and Email Security Appliances - Lite14 Tools &amp; Blog","isPartOf":{"@id":"https:\/\/lite14.net\/blog\/#website"},"datePublished":"2025-11-24T15:49:17+00:00","breadcrumb":{"@id":"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/lite14.net\/blog\/2025\/11\/24\/sonicwall-releases-patches-for-high-severity-vulnerabilities-in-firewalls-and-email-security-appliances\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/lite14.net\/blog\/"},{"@type":"ListItem","position":2,"name":"SonicWall Releases Patches for High-Severity Vulnerabilities in Firewalls and Email Security Appliances"}]},{"@type":"WebSite","@id":"https:\/\/lite14.net\/blog\/#website","url":"https:\/\/lite14.net\/blog\/","name":"Lite14 Tools &amp; Blog","description":"Email Marketing Tools &amp; Digital Marketing Updates","publisher":{"@id":"https:\/\/lite14.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lite14.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/lite14.net\/blog\/#organization","name":"Lite14 Tools &amp; Blog","url":"https:\/\/lite14.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png","contentUrl":"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png","width":191,"height":178,"caption":"Lite14 Tools &amp; Blog"},"image":{"@id":"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lite14.net\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/lite14.net\/blog"],"url":"https:\/\/lite14.net\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts\/17752","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/comments?post=17752"}],"version-history":[{"count":1,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts\/17752\/revisions"}],"predecessor-version":[{"id":17753,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts\/17752\/revisions\/17753"}],"wp:attachment":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/media?parent=17752"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/categories?post=17752"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/tags?post=17752"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}