Read Time:1 Minute, 29 Second

As a cybersecurity expert, I’m here to alert you to a critical vulnerability (CVE-2024-40766) affecting SonicWall Firewall products. This improper access control flaw is actively being exploited in the wild, making it imperative to take immediate action.

Affected Devices and Impact

The vulnerability impacts the following SonicWall Firewall devices:

  • Gen 5 and Gen 6 devices
  • Gen 7 devices running SonicOS versions 7.0.1-5035 and older If exploited, this flaw could lead to:
  • Unauthorized resource access
  • Firewall crashes

Patches and Mitigation

SonicWall has released patches to address the issue. Users are strongly urged to apply these patches immediately:

Impacted PlatformsImpacted VersionsFixed Versions
SOHO (Gen 5)5.9.2.14-12o and older5.9.2.14-13o
Gen6 Firewalls6.5.4.14-109n and older6.5.2.8-2n (for SM9800, NSsp 12400, NSsp 12800) 6.5.4.15.116n (for other Gen6 Firewall appliances)
Gen7 FirewallsSonicOS build version 7.0.1-5035 and olderAny version higher than 7.0.1-5035*

*Note: Refer to the SonicWall advisory for more details on patch versions.

For those who cannot apply patches immediately, SonicWall recommends implementing the following workarounds:

  • Restrict firewall management to trusted sources
  • Disable firewall WAN management from Internet access
  • Restrict SSLVPN access
  • Reset passwords for locally managed accounts
  • Enable Multi-Factor Authentication (MFA) for SSLVPN users

Urgency: High

Given the critical nature of this vulnerability and its active exploitation, it is essential to treat this as a high-priority security issue.

Organizations should:

  • Patch affected devices promptly
  • Implement recommended workarounds
  • Monitor networks for suspicious activity
  • Reset locally managed account passwords
  • Enable MFA for SSLVPN users

SonicWall’s swift response underscores the severity of this threat. Users are advised to remain vigilant and take immediate action to mitigate the risk of unauthorized access or system crashes.

Leave a Reply

Your email address will not be published. Required fields are marked *