Article Details
Scrape Timestamp (UTC): 2025-08-07 10:36:43.401
Source: https://thehackernews.com/2025/08/sonicwall-confirms-patched.html
Original Article Text
Click to Toggle View
SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day. SonicWall has revealed that the recent spike in activity targeting its Gen 7 and newer firewalls with SSL VPN enabled is related to an older, now-patched bug and password reuse. "We now have high confidence that the recent SSL VPN activity is not connected to a zero-day vulnerability," the company said. "Instead, there is a significant correlation with threat activity related to CVE-2024-40766." CVE-2024-40766 (CVSS score: 9.3) was first disclosed by SonicWall in August 2024, calling it an improper access control issue that could allow malicious actors unauthorized access to the devices. "An improper access control vulnerability has been identified in the SonicWall SonicOS management access, potentially leading to unauthorized resource access and, in specific conditions, causing the firewall to crash," it noted in an advisory at the time. SonicWall also said it's investigating less than 40 incidents related to this activity, and that many of the incidents are related to migrations from Gen 6 to Gen 7 firewalls without resetting the local user passwords, a crucial recommendation action as part of CVE-2024-40766. Furthermore, the company pointed out that SonicOS 7.3 has additional protection against brute-force password and multi-factor authentication (MFA) attacks. The updated guidance offered by the company is below - The development comes as multiple security vendors reported observing a surge in attacks exploiting SonicWall SSL VPN appliances for Akira ransomware attacks.
Daily Brief Summary
SonicWall clarified that recent attacks on its Gen 7 firewalls were linked to the patched CVE-2024-40766 vulnerability, not a zero-day exploit.
CVE-2024-40766, with a CVSS score of 9.3, involves improper access control, potentially allowing unauthorized access and causing firewall crashes.
The company is investigating fewer than 40 incidents, many linked to Gen 6 to Gen 7 firewall migrations without password resets.
SonicWall's advisory stresses the importance of resetting local user passwords during firewall migrations to mitigate risks.
SonicOS 7.3 has enhanced security measures, including protections against brute-force password attacks and support for multi-factor authentication.
The vulnerability exploitation has been associated with Akira ransomware attacks, highlighting the need for robust security practices.
SonicWall's proactive communication and guidance aim to prevent further exploitation and ensure customer security.