Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances

Posted on December 17, 2025December 17, 2025 By CWS

Dec 17, 2025Ravie LakshmananVulnerability / Community Safety
SonicWall has rolled out fixes to handle a safety flaw in Safe Cellular Entry (SMA) 100 collection home equipment that it stated has been actively exploited within the wild.
The vulnerability, tracked as CVE-2025-40602 (CVSS rating: 6.6), issues a case of native privilege escalation that arises because of inadequate authorization within the equipment administration console (AMC).
It impacts the next variations –

12.4.3-03093 (platform-hotfix) and earlier variations – Mounted in 12.4.3-03245 (platform-hotfix)
12.5.0-02002 (platform-hotfix) and earlier variations – Mounted in 12.5.0-02283 (platform-hotfix)

“This vulnerability was reported to be leveraged together with CVE-2025-23006 (CVSS rating 9.8) to realize unauthenticated distant code execution with root privileges,” SonicWall stated.
It is value noting that CVE-2025-23006 was patched by the corporate in late January 2025 in model 12.4.3-02854 (platform-hotfix).
Clément Lecigne and Zander Work of Google Risk Intelligence Group (GTIG) have been credited with discovering and reporting CVE-2025-40602. There are at present no particulars on the dimensions of the assaults and who’s behind the efforts.
Again in July, Google stated it is monitoring a cluster named UNC6148 that is concentrating on fully-patched end-of-life SonicWall SMA 100 collection gadgets as a part of a marketing campaign designed to drop a backdoor referred to as OVERSTEP. It is at present not clear if these actions are associated.
In gentle of energetic exploitation, it is important that SonicWall SMA 100 collection customers apply the fixes as quickly as attainable.

The Hacker News Tags:Actively, Appliances, CVE202540602, Exploited, Fixes, SMA, SonicWall

Post navigation

Previous Post: Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
Next Post: Operation ForumTrol Known for Exploiting Chrome 0-Day Attacking Users With New Phishing Campaign

Related Posts

Helping CISOs Speak the Language of Business The Hacker News
U.S. Seizes $7.74M in Crypto Tied to North Korea’s Global Fake IT Worker Network The Hacker News
Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly The Hacker News
Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive The Hacker News
Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025 The Hacker News
Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App
  • China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear
  • Let’s Encrypt Unveils new “Generation Y” root and to 45 day certificates
  • Kimwolf Android Botnet Hijacked 1.8 Million Android Devices Worldwide
  • What Businesses Need to Know

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App
  • China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear
  • Let’s Encrypt Unveils new “Generation Y” root and to 45 day certificates
  • Kimwolf Android Botnet Hijacked 1.8 Million Android Devices Worldwide
  • What Businesses Need to Know

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark