CVE-2025-40602: SonicWall Secure Mobile Access (SMA) 1000 Zero-Day Exploited
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要用特定的开头。首先,我需要仔细阅读文章内容,抓住主要信息。 文章讲的是 SonicWall 的 SMA 1000 设备被发现了一个零日漏洞,CVE-2025-40602,这是一个本地权限提升漏洞。然后,这个漏洞被用来和另一个漏洞 CVE-2025-23006 结合使用,后者是一个反序列化漏洞,之前在1月份已经修补过。攻击者利用这两个漏洞进行链式攻击,从而无需认证就能执行任意代码并获得root权限。 接下来,文章还提到了SonicWall设备过去常被攻击的情况,特别是SMA产品线。最后给出了修复建议和如何检测受影响系统的步骤。 所以总结的时候要包括:零日漏洞、CVE编号、权限提升、链式攻击、影响以及修复建议。控制在100字以内的话,需要简洁明了地表达这些要点。 可能会写成:“SonicWall SMA 1000设备存在零日漏洞CVE-2025-40602,允许本地权限提升。该漏洞与CVE-2025-23006结合使用,可实现无认证的代码执行和root权限获取。修复版本已发布。” 这样既涵盖了主要信息又符合字数限制。 </think> SonicWall SMA 1000设备存在零日漏洞CVE-2025-40602,允许本地权限提升。该漏洞与CVE-2025-23006结合使用,可实现无认证的代码执行和root权限获取。修复版本已发布。 2025-12-17 20:27:25 Author: securityboulevard.com(查看原文) 阅读量:1 收藏

A zero-day vulnerability in SonicWall’s Secure Mobile Access (SMA) 1000 was reportedly exploited in the wild in a chained attack with CVE-2025-23006.

Key takeaways:

  1. CVE-2025-40602 is a local privilege escalation vulnerability in the appliance management console (AMC) of the SonicWall SMA 1000 appliance.
     
  2. CVE-2025-40602 has been exploited in a chained attack with CVE-2025-23006, a deserialization of untrusted data vulnerability patched in January.
     
  3. A list of Tenable plugins for this vulnerability can be found on the individual CVE pages for CVE-2025-40602 and CVE-2025-23006.

Background

On December 17, SonicWall published a security advisory (SNWLID-2025-0019) for a newly disclosed vulnerability in its Secure Mobile Access (SMA) 1000 product, a remote access solution.

CVE Description CVSSv3
CVE-2025-40602 SonicWall SMA 1000 Privilege Escalation Vulnerability 6.6

Analysis

CVE-2025-40602 is a local privilege escalation vulnerability in the appliance management console (AMC) of the SonicWall SMA 1000 appliance. An authenticated, remote attacker could exploit this vulnerability to escalate privileges on an affected device. While on its own, this flaw would require authentication in order to exploit, the advisory from SonicWall states that CVE-2025-40602 has been exploited in a chained attack with CVE-2025-23006, a deserialization of untrusted data vulnerability patched in January. The combination of these two vulnerabilities would allow an unauthenticated attacker to execute arbitrary code with root privileges.

According to SonicWall, “SonicWall Firewall products are not affected by this vulnerability.”

Historical exploitation of SonicWall vulnerabilities

SonicWall products have been a frequent target for attackers over the years. Specifically, the SMA product line has been targeted in the past by ransomware groups, as well as being featured in the Top Routinely Exploited Vulnerabilities list co-authored by multiple United States and International Agencies.

Earlier this year, an increase in ransomware activity tied to SonicWall Gen 7 Firewalls was observed. While initially it was believed that a new zero-day may have been the root cause, SonicWall later provided a statement noting that exploitation activity was in relation to CVE-2024-40766, an improper access control vulnerability which had been observed to have been exploited in the wild. More information on this can be found on our blog.

Given the past exploitation of SonicWall devices, we put together the following list of known SMA vulnerabilities that have been exploited in the wild:

CVE Description Tenable Blog Links Year
CVE-2019-7481 SonicWall SMA100 SQL Injection Vulnerability 1 2019
CVE-2019-7483 SonicWall SMA100 Directory Traversal Vulnerability 2019
CVE-2021-20016 SonicWall SSLVPN SMA100 SQL Injection Vulnerability 1, 2, 3, 4, 5 2021
CVE-2021-20038 SonicWall SMA100 Stack-based Buffer Overflow Vulnerability 1, 2, 3 2021
CVE-2025-23006 SonicWall SMA 1000 Deserialization of Untrusted Data Vulnerability 1 2025
CVE-2024-40766 SonicWall SonicOS Improper Access Control Vulnerability 1 2025

Proof of concept

At the time this blog was published, no proof-of-concept (PoC) code had been published for CVE-2025-40602. If and when a public PoC exploit becomes available for CVE-2025-40602, we anticipate a variety of attackers will attempt to leverage this flaw as part of their attacks.

Solution

SonicWall has released patches to address this vulnerability as outlined in the table below:

Affected Version Fixed Version
12.4.3-03093 and earlier 12.4.3-03245
12.5.0-02002 and earlier 12.5.0-02283

The advisory also provides a workaround to reduce potential impact. This involves restricting access to the AMC to trusted sources. We recommend reviewing the advisory for the most up to date information on patches and workaround steps.

Identifying affected systems

A list of Tenable plugins for this vulnerability can be found on the individual CVE page for CVE-2025-40602 as they’re released. This link will display all available plugins for this vulnerability, including upcoming plugins in our Plugins Pipeline. In addition, product coverage for CVE-2025-23006 can be found here.

Tenable Attack Surface Management customers are able to identify these assets using a filtered search for SonicWall devices:

Get more information

Join on Tenable Connect and engage with us in the for further discussions on the latest cyber threats.

Learn more about , the Exposure Management Platform for the modern attack surface.

*** This is a Security Bloggers Network syndicated blog from Tenable Blog authored by Scott Caveza. Read the original post at: https://www.tenable.com/blog/cve-2025-40602-sonicwall-secure-mobile-access-sma-1000-zero-day-exploited


文章来源: https://securityboulevard.com/2025/12/cve-2025-40602-sonicwall-secure-mobile-access-sma-1000-zero-day-exploited/
如有侵权请联系:admin#unsafe.sh