Categories: Cyber Security News

ACSC Warns of Actively Exploited SonicWall Access Control Vulnerability

The Australian Cyber Security Centre (ACSC) has issued a critical alert regarding a severe access control vulnerability in SonicWall products that is being actively exploited by threat actors.

Tracked as CVE-2024-40766 with a critical CVSS score of 9.3, this flaw affects multiple generations of SonicWall firewalls and exposes organizations to unauthorized access, lateral movement, and potential ransomware deployment.

Assigned advisory ID SNWLID-2024-0015, the vulnerability resides within the SonicOS management interface and SSLVPN components of SonicWall firewalls.

An improper access control issue allows an unauthenticated remote attacker to bypass authentication checks and gain unauthorized access to sensitive resources.

Under specific conditions, exploitation can also trigger a denial-of-service condition by causing the device to crash.

Affected models include Gen 5 and Gen 6 firewalls, as well as Gen 7 devices running SonicOS version 7.0.1-5035 and earlier.

Given the widespread deployment of these devices across government, education, healthcare, and enterprise networks, the risk of unauthorized intrusion and operational disruption is significant.

Active Exploitation by Ransomware Actors

The ACSC warning highlights a recent surge in active exploitation of CVE-2024-40766 targeting Australian entities.

Adversaries associated with the Akira ransomware group have been observed leveraging this flaw as an initial access vector.

By exploiting the vulnerability, attackers establish a foothold within the network perimeter, allowing them to move laterally, escalate privileges, and deploy ransomware to encrypt critical data.

Akira operators have a history of targeting vulnerable network edge devices to bypass perimeter defenses and gain persistent access.

The ACSC notes that several Australian organizations have already experienced intrusion attempts exploiting the SonicWall flaw, underscoring the immediacy of the threat.

Both SonicWall and the ACSC urge organizations with affected devices to take immediate action to mitigate risk.

The primary recommendation is to apply the security patches released by SonicWall, which fully address the access control flaw.

Following patch deployment, organizations must reset all passwords associated with the devices to ensure that any previously compromised credentials cannot be reused by threat actors.

Failure to update credentials after patching could leave systems vulnerable despite the firmware fix.

In addition to patching and credential changes, affected organizations should conduct the following steps:

Review network inventories to identify any unpatched SonicWall firewalls and SSLVPN endpoints.
Monitor firewall logs for unusual authentication attempts or connection patterns indicative of exploitation.
Implement network segmentation to limit the potential for lateral movement originating from compromised edge devices.
Consult the official advisories published by SonicWall and the ACSC for detailed investigation and remediation guidance.

By taking these proactive measures, organizations can reduce the risk of unauthorized access, ransomware deployment, and operational disruption.

The ACSC emphasizes that immediate patching and credential updates are crucial to preventing further exploitation of this critical vulnerability.

Find this Story Interesting! Follow us on Google NewsLinkedIn and X to Get More Instant Updates

The post ACSC Warns of Actively Exploited SonicWall Access Control Vulnerability appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

DC’s Absolute Universe Dominates the 2026 Eisner Award Nominations

The list of nominees for the 2026 Will Eisner Comic Industry Awards has been revealed.…

41 minutes ago

New Malware Framework Enables Screen Control, Browser Artifact Access, and UAC Bypass

A newly uncovered malware framework is raising serious alarms across the cybersecurity community. Researchers have…

1 hour ago

node-ipc npm Package with 822K Weekly Downloads Compromised in Supply Chain Attack

A widely used JavaScript inter-process communication library has been weaponized again. Socket and Stepsecurity have…

1 hour ago

Anthropic’s Mythos AI Reportedly Found macOS Vulnerabilities that Could Bypass Apple Security

Security researchers at Calif, a Palo Alto-based cybersecurity firm, have used techniques derived from an…

1 hour ago

Hackers Compromise 170 npm Packages to Steal GitHub, npm, AWS, and Kubernetes Secrets

A sprawling supply chain attack has put software developers worldwide on high alert after hackers…

1 hour ago

Critical Canon MailSuite Vulnerability Enables Remote Code Execution Attacks

Enterprise email infrastructure remains one of the most critical and vulnerable targets for cybercriminals. A…

1 hour ago

This website uses cookies.