Article Details
Scrape Timestamp (UTC): 2024-09-06 13:22:53.399
Original Article Text
Click to Toggle View
SonicWall SSLVPN access control flaw is now exploited in attacks. SonicWall is warning that a recently fixed access control flaw tracked as CVE-2024-40766 in SonicOS is now "potentially" exploited in attacks, urging admins to apply patches as soon as possible. "This vulnerability is potentially being exploited in the wild. Please apply the patch as soon as possible for affected products. The latest patch builds are available for download on mysonicwall.com," warns the updated SonicWall advisory. CVE-2024-40766 is a critical (CVSS v3 score: 9.3) access control flaw impacting SonicWall Firewall Gen 5 and Gen 6 devices, as well as Gen 7 devices. The software vendor did not disclose much information about the flaw other than its potential for unauthorized resource access and ability to crash the firewall, thus eliminating network protections. When SonicWall first disclosed the flaw on August 22, 2024, the flaw was only believed to be in the SonicWall SonicOS management access. With today's update, the company is warning that CVE-2024-40766 also impacts the firewall's SSLVPN feature. Apply patches as soon as possible The list of impacted products and versions, as well as the releases that address CVE-2024-40766, are summarized as follows: The latest mitigation recommendations by SonicWall include: While SonicWall has not shared how the flaw is being actively exploited, similar flaws have been used in the past to gain initial access to corporate networks. Threat actors commonly target SonicWall as they are exposed to the internet to provide remote VPN access. In March 2023, suspected Chinese hackers (UNC4540) targeted unpatched SonicWall Secure Mobile Access (SMA) devices to install custom malware that persisted through firmware upgrades. BleepingComputer contacted SonicWall to learn more about how the flaw is being actively exploited in attacks, but a response was not immediately available.
Daily Brief Summary
SonicWall has issued an urgent advisory for a critical access control flaw, CVE-2024-40766, in its SonicOS, affecting Firewall Gen 5, 6, and 7 devices.
The security vulnerability was initially disclosed on August 22, 2024, but recent updates show it also affects the SSLVPN feature on these firewalls.
Affected devices are prone to unauthorized access and potential network crashes due to this flaw, jeopardizing network protections.
The CVSS v3 score for this vulnerability is 9.3, highlighting its severity.
SonicWall has not specified how the flaw is being exploited but historically, similar vulnerabilities have facilitated initial access to corporate networks.
Patching updates are urgently recommended and available for download at mysonicwall.com to mitigate potential cyber attacks.
Attackers, including suspected nation-state actors, have previously exploited similar vulnerabilities in SonicWall products.