SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day
SonicWall近期发现针对其Gen 7及更新防火墙的攻击活动增加,与已修复的高危漏洞CVE-2024-40766相关,该漏洞可导致未经授权访问设备甚至崩溃。攻击还与密码复用有关,特别是在从Gen 6迁移到Gen 7时未重置本地用户密码。SonicWall建议更新固件至7.3.0版本,重置相关账户密码并启用多因素认证等安全措施。 2025-8-7 10:32:0 Author: thehackernews.com(查看原文) 阅读量:12 收藏

Network Security / Vulnerability

SonicWall has revealed that the recent spike in activity targeting its Gen 7 and newer firewalls with SSL VPN enabled is related to an older, now-patched bug and password reuse.

"We now have high confidence that the recent SSL VPN activity is not connected to a zero-day vulnerability," the company said. "Instead, there is a significant correlation with threat activity related to CVE-2024-40766."

CVE-2024-40766 (CVSS score: 9.3) was first disclosed by SonicWall in August 2024, calling it an improper access control issue that could allow malicious actors unauthorized access to the devices.

"An improper access control vulnerability has been identified in the SonicWall SonicOS management access, potentially leading to unauthorized resource access and, in specific conditions, causing the firewall to crash," it noted in an advisory at the time.

Cybersecurity

SonicWall also said it's investigating less than 40 incidents related to this activity, and that many of the incidents are related to migrations from Gen 6 to Gen 7 firewalls without resetting the local user passwords, a crucial recommendation action as part of CVE-2024-40766.

Furthermore, the company pointed out that SonicOS 7.3 has additional protection against brute-force password and multi-factor authentication (MFA) attacks. The updated guidance offered by the company is below -

  • Update firmware to SonicOS version 7.3.0
  • Reset all local user account passwords for any accounts with SSLVPN access, particularly those that were carried over during migration from Gen 6 to Gen 7
  • Enable Botnet Protection and Geo-IP Filtering
  • Enforce MFA and strong password policies
  • Remove unused or inactive user accounts

The development comes as multiple security vendors reported observing a surge in attacks exploiting SonicWall SSL VPN appliances for Akira ransomware attacks.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/08/sonicwall-confirms-patched.html
如有侵权请联系:admin#unsafe.sh