Security

Patches

SonicWall flags critical bug likely exploited as zero-day, rolls out hotfix

Big organizations and governments are main users of these gateways


SonicWall is warning customers of a critical vulnerability that was potentially already exploited as a zero-day.

The bug affects SonicWall's Secure Mobile Access (SMA) line, specifically the SMA 1000 product. The company stated in an advisory on Thursday that a remote unauthenticated attacker could execute arbitrary OS commands "in specific conditions."

SonicWall didn't specify what these conditions were, likely out of concern about giving criminals more details on how to exploit CVE-2025-23006, but given the 9.8 severity rating, it's safe to assume these conditions can be met in many cases.

Regardless, The Register requested additional details from the vendor but its spokespeople simply referred us back to the advisory.

What we do know is that CVE-2025-23006 affects the SMA 1000's Appliance Management Console (AMC) and Central Management Console (CMC), both of which are used for admin tasks including configuring and monitoring hardware and creating new admin accounts.

Although little has been said about the nature of the vulnerability – again, likely to give defenders time to apply patches – we can infer some elements from the breakdown of the severity score calculation.

The attack complexity is "low," no privileges are required for exploitation, and the risk to confidentiality, integrity, and system availability is rated "high" in all three categories.

The vendor released hotfix version 12.4.3-02854 (platform-hotfix), nullifying the issue. All prior versions are considered vulnerable.

A workaround is also available. The advisory reads: "To minimize the potential impact of the vulnerability, please ensure that you restrict access to trusted sources for the AMC and CMC."

These measures should ideally have already been taken, since they're part of the product's admin documentation, listed under "Best Practices for Securing the Appliance."

SonicWall's website states that the SMA 1000 gateways are used by the likes of MSSPs, enterprises, and government agencies to secure remote access to corporate datacenters hosted on-prem, in the cloud, or in hybrid setups.

It's not clear how many devices are currently operational across the globe, but we've asked the vendor to clarify this.

The advisory also clearly states that SonicWall Firewall and the SMA 100 series of appliances, designed for small and medium businesses, are unaffected. SonicWall credits the Microsoft Threat Intelligence Center for the discovery. ®

Send us news
10 Comments

SonicWall firewalls now under attack: Patch ASAP or risk intrusion via your SSL VPN

Roses are red, violets are blue, CVE-2024-53704 is sweet for a ransomware crew

Critical PostgreSQL bug tied to zero-day attack on US Treasury

High-complexity bug unearthed by infoseccers, as Rapid7 probes exploit further

Ransomware criminals love CISA's KEV list – and that's a bug, not a feature

1 in 3 entries are used to extort civilians, says new paper

Wallbleed vulnerability unearths secrets of China's Great Firewall 125 bytes at a time

Boffins poked around inside censorship engines – here's what they found

MITRE Caldera security suite scores perfect 10 for insecurity

Is a trivial remote-code execution hole in every version part of the training, or?

Crimelords and spies for rogue states are working together, says Google

Only lawmakers can stop them. Plus: software needs to be more secure, but what's in it for us?

Critical flaws in Mongoose library expose MongoDB to data thieves, code execution

Bugs fixed, updating to the latest version is advisable

Palo Alto firewalls under attack as miscreants chain flaws for root access

If you want to avoid urgent patches, stop exposing management consoles to the public internet

FreSSH bugs undiscovered for years threaten OpenSSH security

Exploit code now available for MitM and DoS attacks

Microsoft names alleged credential-snatching 'Azure Abuse Enterprise' operators

Crew helped lowlifes generate X-rated celeb deepfakes using Redmond's OpenAI-powered cloud – claim

Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’

FYI: What NOT to search after committing a crime

Does terrible code drive you mad? Wait until you see what it does to OpenAI's GPT-4o

Model was fine-tuned to write vulnerable software – then suggested enslaving humanity