Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day

Posted on August 7, 2025August 7, 2025 By CWS

Aug 07, 2025Ravie LakshmananNetwork Safety / Vulnerability
SonicWall has revealed that the current spike in exercise focusing on its Gen 7 and newer firewalls with SSL VPN enabled is expounded to an older, now-patched bug and password reuse.
“We now have excessive confidence that the current SSL VPN exercise will not be related to a zero-day vulnerability,” the corporate mentioned. “As an alternative, there’s a important correlation with risk exercise associated to CVE-2024-40766.”
CVE-2024-40766 (CVSS rating: 9.3) was first disclosed by SonicWall in August 2024, calling it an improper entry management concern that would enable malicious actors unauthorized entry to the gadgets.
“An improper entry management vulnerability has been recognized within the SonicWall SonicOS administration entry, doubtlessly resulting in unauthorized useful resource entry and, in particular situations, inflicting the firewall to crash,” it famous in an advisory on the time.

SonicWall additionally mentioned it is investigating lower than 40 incidents associated to this exercise, and that most of the incidents are associated to migrations from Gen 6 to Gen 7 firewalls with out resetting the native person passwords, an important advice motion as a part of CVE-2024-40766.
Moreover, the corporate identified that SonicOS 7.3 has further safety in opposition to brute-force password and multi-factor authentication (MFA) assaults. The up to date steering provided by the corporate is beneath –

Replace firmware to SonicOS model 7.3.0
Reset all native person account passwords for any accounts with SSLVPN entry, significantly those who have been carried over throughout migration from Gen 6 to Gen 7
Allow Botnet Safety and Geo-IP Filtering
Implement MFA and robust password insurance policies
Take away unused or inactive person accounts

The event comes as a number of safety distributors reported observing a surge in assaults exploiting SonicWall SSL VPN home equipment for Akira ransomware assaults.

The Hacker News Tags:Attacks, Confirms, Patched, SonicWall, VPN, Vulnerability, ZeroDay

Post navigation

Previous Post: New HTTP Request Smuggling Attacks Impacted CDNs, Major Orgs, Millions of Websites
Next Post: 10 Best Data Loss Prevention Software in 2025

Related Posts

Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters The Hacker News
SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild The Hacker News
New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks The Hacker News
AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation The Hacker News
Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations The Hacker News
U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Libraesva Email Security Gateway Vulnerability Exploited by Nation-State Hackers
  • State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability
  • Chrome High-severity Vulnerabilities Let Attackers Access Sensitive Data and Crash System
  • Threat Actors Breaking to Enterprise Infrastructure Within 18 Minutes From Initial Access
  • New Malware in npm Package Steals Browser Passwords Using Steganographic QR Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Libraesva Email Security Gateway Vulnerability Exploited by Nation-State Hackers
  • State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability
  • Chrome High-severity Vulnerabilities Let Attackers Access Sensitive Data and Crash System
  • Threat Actors Breaking to Enterprise Infrastructure Within 18 Minutes From Initial Access
  • New Malware in npm Package Steals Browser Passwords Using Steganographic QR Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News