Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ACSC Warns Of Sonicwall Access Control Vulnerability Actively Exploited In Attacks

Posted on September 11, 2025September 11, 2025 By CWS

The Australian Cyber Safety Centre (ACSC) has issued a crucial alert concerning a extreme entry management vulnerability in SonicWall merchandise that’s being actively exploited in assaults.

The flaw, tracked as CVE-2024-40766, impacts a number of generations of SonicWall firewalls and carries a crucial CVSS rating of 9.3, highlighting the numerous threat it poses to organizations.

The advisory notes a latest enhance in exploitation focusing on Australian entities, with menace actors just like the Akira ransomware group leveraging the vulnerability.

The vulnerability, recognized beneath advisory ID SNWLID-2024-0015, is an improper entry management subject throughout the SonicWall SonicOS administration interface and SSLVPN.

This flaw permits an unauthenticated distant attacker to achieve unauthorized entry to delicate sources.

In accordance with the seller’s safety advisory, beneath particular circumstances, the exploitation of this vulnerability may result in a denial-of-service situation by inflicting the firewall to crash.

The problem impacts a variety of units, together with SonicWall’s Gen 5 and Gen 6 firewalls, in addition to Gen 7 units operating SonicOS model 7.0.1-5035 and earlier. The large deployment of those units throughout varied sectors makes this a widespread menace.

Lively Exploitation By Ransomware Teams

The ACSC’s warning emphasizes that this isn’t a theoretical menace. The company is conscious of a latest surge in lively exploitation of CVE-2024-40766 inside Australia.

Particularly, the advisory hyperlinks the vulnerability to assaults carried out by the Akira ransomware gang, a bunch recognized for focusing on susceptible community edge units as an preliminary entry vector into company networks.

By exploiting the SonicWall flaw, attackers can set up a foothold from which they’ll transfer laterally, escalate privileges, and finally deploy ransomware to encrypt crucial knowledge and disrupt operations, a tactic that aligns with Akira’s recognized strategies.

Each SonicWall and the ACSC are urging organizations utilizing the affected units to take fast motion to mitigate the chance.

The first step is to use the safety patches launched by SonicWall, which tackle the vulnerability. Nonetheless, patching alone shouldn’t be ample.

The seller has pressured that organizations should additionally change passwords related to the units after the firmware replace is full.

Failure to replace credentials leaves the group susceptible to compromise, even after the patch has been utilized.

Organizations are suggested to evaluate their networks for susceptible SonicWall units and seek the advice of the official advisories for detailed investigation and remediation steering to forestall unauthorized entry and potential ransomware assaults.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates.

Cyber Security News Tags:Access, ACSC, Actively, Attacks, Control, Exploited, SonicWall, Vulnerability, Warns

Post navigation

Previous Post: AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto
Next Post: DDoS Mitigation Provider targeted In 1.5 Gpps 1.5 Billion Packets per Second DDoS Attack

Related Posts

SparkKitty Attacks iOS and Android Devices in Wild Via App Store and Google Play Cyber Security News
APT Hackers Exploited Windows WebDAV 0-Day RCE Vulnerability in the Wild to Deploy Malware Cyber Security News
D-Link 0-click Vulnerability Allows Remote Attackers to Crash the Server Cyber Security News
Volkswagen Allegedly Hit by Ransomware Attack as 8Base Claims Sensitive Data Theft Cyber Security News
Insecure GitHub Actions in Open Source Projects MITRE and Splunk Exposes Critical Vulnerabilities Cyber Security News
Top 10 Best Autonomous Endpoint Management Tools in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybersecurity Newsletter Weekly – AWS Outage, WSUS Exploitation, Chrome Flaws, and RDP Attacks
  • 706,000+ BIND 9 Resolver Instances Vulnerable to Cache Poisoning Exposed Online
  • LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments
  • Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control
  • Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybersecurity Newsletter Weekly – AWS Outage, WSUS Exploitation, Chrome Flaws, and RDP Attacks
  • 706,000+ BIND 9 Resolver Instances Vulnerable to Cache Poisoning Exposed Online
  • LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments
  • Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control
  • Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News