Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ACSC Warns Of Sonicwall Access Control Vulnerability Actively Exploited In Attacks

Posted on September 11, 2025September 11, 2025 By CWS

The Australian Cyber Safety Centre (ACSC) has issued a crucial alert concerning a extreme entry management vulnerability in SonicWall merchandise that’s being actively exploited in assaults.

The flaw, tracked as CVE-2024-40766, impacts a number of generations of SonicWall firewalls and carries a crucial CVSS rating of 9.3, highlighting the numerous threat it poses to organizations.

The advisory notes a latest enhance in exploitation focusing on Australian entities, with menace actors just like the Akira ransomware group leveraging the vulnerability.

The vulnerability, recognized beneath advisory ID SNWLID-2024-0015, is an improper entry management subject throughout the SonicWall SonicOS administration interface and SSLVPN.

This flaw permits an unauthenticated distant attacker to achieve unauthorized entry to delicate sources.

In accordance with the seller’s safety advisory, beneath particular circumstances, the exploitation of this vulnerability may result in a denial-of-service situation by inflicting the firewall to crash.

The problem impacts a variety of units, together with SonicWall’s Gen 5 and Gen 6 firewalls, in addition to Gen 7 units operating SonicOS model 7.0.1-5035 and earlier. The large deployment of those units throughout varied sectors makes this a widespread menace.

Lively Exploitation By Ransomware Teams

The ACSC’s warning emphasizes that this isn’t a theoretical menace. The company is conscious of a latest surge in lively exploitation of CVE-2024-40766 inside Australia.

Particularly, the advisory hyperlinks the vulnerability to assaults carried out by the Akira ransomware gang, a bunch recognized for focusing on susceptible community edge units as an preliminary entry vector into company networks.

By exploiting the SonicWall flaw, attackers can set up a foothold from which they’ll transfer laterally, escalate privileges, and finally deploy ransomware to encrypt crucial knowledge and disrupt operations, a tactic that aligns with Akira’s recognized strategies.

Each SonicWall and the ACSC are urging organizations utilizing the affected units to take fast motion to mitigate the chance.

The first step is to use the safety patches launched by SonicWall, which tackle the vulnerability. Nonetheless, patching alone shouldn’t be ample.

The seller has pressured that organizations should additionally change passwords related to the units after the firmware replace is full.

Failure to replace credentials leaves the group susceptible to compromise, even after the patch has been utilized.

Organizations are suggested to evaluate their networks for susceptible SonicWall units and seek the advice of the official advisories for detailed investigation and remediation steering to forestall unauthorized entry and potential ransomware assaults.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates.

Cyber Security News Tags:Access, ACSC, Actively, Attacks, Control, Exploited, SonicWall, Vulnerability, Warns

Post navigation

Previous Post: AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto
Next Post: DDoS Mitigation Provider targeted In 1.5 Gpps 1.5 Billion Packets per Second DDoS Attack

Related Posts

New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users Cyber Security News
Leak Zone Dark Web Forum Database Exposes 22 Million Users’ IP Addresses and Locations Cyber Security News
ChatGPT Agent Bypasses Cloudflare “I am not a robot” Verification Checks Cyber Security News
Windows Defender Vulnerability Allows Service Hijacking and Disablement via Symbolic Link Attack Cyber Security News
Hackers Allegedly Selling WinRAR 0-day Exploit on Dark Web Forums for $80,000 Cyber Security News
New ClickFake Interview Attack Using ClickFix Technique to Deliver GolangGhost Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Webinar Today: Breaking AI – Inside the Art of LLM Pen Testing
  • Cisco Patches High-Severity IOS XR Vulnerabilities
  • kkRAT Employs Network Communication Protocol to Steal Clipboard Contents
  • Cornwell Quality Tools Data Breach
  • Critical Chrome Vulnerability Earns Researcher $43,000

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Webinar Today: Breaking AI – Inside the Art of LLM Pen Testing
  • Cisco Patches High-Severity IOS XR Vulnerabilities
  • kkRAT Employs Network Communication Protocol to Steal Clipboard Contents
  • Cornwell Quality Tools Data Breach
  • Critical Chrome Vulnerability Earns Researcher $43,000

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News