Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ACSC Warns Of Sonicwall Access Control Vulnerability Actively Exploited In Attacks

Posted on September 11, 2025September 11, 2025 By CWS

The Australian Cyber Safety Centre (ACSC) has issued a crucial alert concerning a extreme entry management vulnerability in SonicWall merchandise that’s being actively exploited in assaults.

The flaw, tracked as CVE-2024-40766, impacts a number of generations of SonicWall firewalls and carries a crucial CVSS rating of 9.3, highlighting the numerous threat it poses to organizations.

The advisory notes a latest enhance in exploitation focusing on Australian entities, with menace actors just like the Akira ransomware group leveraging the vulnerability.

The vulnerability, recognized beneath advisory ID SNWLID-2024-0015, is an improper entry management subject throughout the SonicWall SonicOS administration interface and SSLVPN.

This flaw permits an unauthenticated distant attacker to achieve unauthorized entry to delicate sources.

In accordance with the seller’s safety advisory, beneath particular circumstances, the exploitation of this vulnerability may result in a denial-of-service situation by inflicting the firewall to crash.

The problem impacts a variety of units, together with SonicWall’s Gen 5 and Gen 6 firewalls, in addition to Gen 7 units operating SonicOS model 7.0.1-5035 and earlier. The large deployment of those units throughout varied sectors makes this a widespread menace.

Lively Exploitation By Ransomware Teams

The ACSC’s warning emphasizes that this isn’t a theoretical menace. The company is conscious of a latest surge in lively exploitation of CVE-2024-40766 inside Australia.

Particularly, the advisory hyperlinks the vulnerability to assaults carried out by the Akira ransomware gang, a bunch recognized for focusing on susceptible community edge units as an preliminary entry vector into company networks.

By exploiting the SonicWall flaw, attackers can set up a foothold from which they’ll transfer laterally, escalate privileges, and finally deploy ransomware to encrypt crucial knowledge and disrupt operations, a tactic that aligns with Akira’s recognized strategies.

Each SonicWall and the ACSC are urging organizations utilizing the affected units to take fast motion to mitigate the chance.

The first step is to use the safety patches launched by SonicWall, which tackle the vulnerability. Nonetheless, patching alone shouldn’t be ample.

The seller has pressured that organizations should additionally change passwords related to the units after the firmware replace is full.

Failure to replace credentials leaves the group susceptible to compromise, even after the patch has been utilized.

Organizations are suggested to evaluate their networks for susceptible SonicWall units and seek the advice of the official advisories for detailed investigation and remediation steering to forestall unauthorized entry and potential ransomware assaults.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates.

Cyber Security News Tags:Access, ACSC, Actively, Attacks, Control, Exploited, SonicWall, Vulnerability, Warns

Post navigation

Previous Post: AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto
Next Post: DDoS Mitigation Provider targeted In 1.5 Gpps 1.5 Billion Packets per Second DDoS Attack

Related Posts

A Milestone Powering Crypto’s Global Reach Cyber Security News
Multiple 0-days to Bypass BitLocker and Extract All Protected Data Cyber Security News
International Criminal Court Hit by New Sophisticated Cyber Attack Cyber Security News
Ransomware 2.0 How AI-Powered Attacks Are Evolving Cyber Security News
SAP Security Patch Day – 15 Vulnerabilities Patched including 3 Critical Injection Vulnerabilities Cyber Security News
Hackers Can Compromise Chromium Browsers in Windows by Loading Arbitrary Extensions Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
  • New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users
  • Gladinet CentreStack Flaw Exploited to Hack Organizations
  • CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems
  • Recent GeoServer Vulnerability Exploited in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
  • New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users
  • Gladinet CentreStack Flaw Exploited to Hack Organizations
  • CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems
  • Recent GeoServer Vulnerability Exploited in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark