Hackers Actively Exploit SonicWall SMA1000 Zero-Day to Escalate Privileges

Hackers Actively Exploit SonicWall SMA1000 Zero-Day to Escalate Privileges
Hackers Actively Exploit SonicWall SMA1000 Zero-Day to Escalate Privileges
SonicWall has issued an urgent security advisory warning of active exploitation targeting its SMA1000 appliances.

The vulnerability, a local privilege escalation flaw, allows attackers with access to the management console to gain elevated privileges and potentially take complete control of affected systems.

Tracked as CVE-2025-40602, this flaw stems from insufficient authorization checks within the SonicWall SMA1000 Appliance Management Console (AMC).

While the vulnerability itself has a medium severity rating, its real danger lies in how hackers are combining it with other exploits to launch devastating attacks.

FieldValue
Vulnerability NameSonicWall SMA1000 Local Privilege Escalation
CVE IDCVE-2025-40602
Advisory IDSNWLID-2025-0019
CVSS Score6.6 (Medium)
Attack VectorLocal / Management Console
ImpactPrivilege Escalation, System Compromise

The Attack Chain: From Medium to Critical Risk

Researchers from the Google Threat Intelligence Group discovered that, although CVE-2025-40602 requires management access to exploit, threat actors are actively chaining it to a separate, more critical vulnerability: CVE-2025-23006 (CVSS 9.8).

The previous flaw (CVE-2025-23006) was addressed mainly in January 2025, but unpatched systems remain at risk.

By combining these two vulnerabilities, attackers can bypass authentication entirely and execute a two-stage attack.

First, they gain initial access, then leverage the new privilege-escalation flaw to execute malicious code with root privileges.

This effectively grants the attacker complete administrative control of the device.

The vulnerability impacts explicitly SMA1000 devices running the following platform-hotfix versions:

  • Version 12.4.3-03093 and earlier
  • Version 12.5.0-02002 and earlier

SonicWall has clarified that this flaw does not affect SSL-VPN functionality on standalone firewalls, thereby limiting exposure to dedicated SMA1000 appliance users.

To address this critical risk, SonicWall has released official patches. Organizations are urged to upgrade immediately to:

  • Platform-hotfix 12.4.3-03245 or higher
  • Platform-hotfix 12.5.0-02283 or higher

Given the active exploitation, SonicWall PSIRT advises administrators to patch immediately. If an upgrade is not instantly possible, the following temporary mitigations should be applied to the Appliance Management Console (AMC):

  1. Restrict SSH Access: Limit SSH connections exclusively to trusted administrative IP addresses or secure internal VPNs.
  2. Disable Public Access: Ensure the AMC and SSH services are not accessible from the public internet.

Registered users can download the necessary security patches directly through the mysonicwall.com portal.

Failure to update could leave critical remote access infrastructure open to complete compromise.

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

The post Hackers Actively Exploit SonicWall SMA1000 Zero-Day to Escalate Privileges appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading