SonicWall on Wednesday warned that risk actors have been exploiting a vulnerability within the Safe Cell Entry (SMA) 1000 equipment administration console (AMC) as a zero-day.
The newly disclosed flaw, tracked as CVE-2025-40602 (CVSS rating of 6.6), is a medium-severity native privilege escalation challenge.
Rooted in inadequate authorization within the SMA 1000 AMC administration instrument, the bug was found by researchers of Google’s Risk Intelligence Group (GTIG).
In its Wednesday advisory, SonicWall warned that the safety defect has been exploited as a zero-day, however didn’t element the noticed assaults.
“This vulnerability was reported to be leveraged together with CVE-2025-23006 (CVSS rating 9.8) to realize unauthenticated distant code execution with root privileges,” the corporate stated.
Disclosed in January as a zero-day and described as an untrusted knowledge deserialization challenge, CVE-2025-23006 was patched in model 12.4.3-02854 of the SMA 100 sequence platform.
The contemporary SonicWall zero-day was resolved in variations 12.4.3-03245 (platform-hotfix) and 12.5.0-02283 (platform-hotfix).
On Wednesday, the US cybersecurity company CISA added CVE-2025-40602 to its Recognized Exploited Vulnerabilities (KEV) listing, urging quick patching.Commercial. Scroll to proceed studying.
Per Binding Operational Directive (BOD) 22-01, federal businesses have three weeks to handle flaws newly added to KEV, however CISA has given them just one week to resolve the brand new SonicWall zero-day.
Organizations are suggested to replace their SMA 1000 home equipment to the most recent hotfix as quickly as doable, or to use mitigations offered by SonicWall.
These embody proscribing SSH entry to the AMC through VPN or particular admin IPs, and disabling the SSL VPN administration interface (AMC) and SSH entry from the general public web.
In line with SonicWall, the vulnerability doesn’t impression SSL-VPN operating on SonicWall firewall merchandise.
SonicWall disclosed the safety defect on the identical day that Cisco warned of a bug in its safety home equipment that has been exploited as a zero-day by a China-linked risk group.
Associated: SonicWall Patches Excessive-Severity Flaws in Firewalls, E mail Safety Equipment
Associated: State-Sponsored Hackers Stole SonicWall Cloud Backups in Latest Assault
Associated: Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw
Associated: Unpatched Gogs Zero-Day Exploited for Months
