SonicWall Confirms Recent Firewall Attacks Tied to Old Vulnerability and Password Reuse, Not Zero-Day

SonicWall Confirms Recent Firewall Attacks Tied to Old Vulnerability and Password Reuse, Not Zero-Day

SonicWall has confirmed that the recent wave of cyberattacks targeting its Gen 7 firewalls with SSL VPN enabled is not linked to a newly discovered vulnerability. Instead, the activity is associated with CVE-2024-40766, an already patched security flaw, and the reuse of passwords from earlier device generations.

“We now have high confidence that the recent SSL VPN activity is not connected to a zero-day vulnerability,” the company stated. “Instead, there is a significant correlation with threat activity related to CVE-2024-40766.”

Originally disclosed in August 2024, CVE-2024-40766 is a critical improper access control flaw (CVSS score: 9.3) in SonicWall’s SonicOS that could allow unauthorized access to firewalls and potentially trigger crashes under certain conditions. The issue primarily affects management access to SonicWall devices.

SonicWall has reported fewer than 40 confirmed incidents so far. A majority of these stem from migrations from Gen 6 to Gen 7 firewalls where local user passwords weren’t reset — a key recommendation issued when the flaw was disclosed. This oversight has left some networks vulnerable, despite the availability of a fix.

The company emphasized that its SonicOS 7.3 firmware version includes improved protections against brute-force attacks and multi-factor authentication (MFA) bypass attempts. It has also reissued a set of mitigation best practices, urging users to:

  • Upgrade to SonicOS 7.3.0
  • Reset all local SSL VPN user passwords, especially those carried over from Gen 6
  • Enable Botnet Protection and Geo-IP Filtering
  • Enforce strong password policies and MFA
  • Delete unused or inactive user accounts

The uptick in exploit attempts comes as multiple cybersecurity firms, including Huntress and Arctic Wolf, report increasing use of SonicWall SSL VPN appliances in Akira ransomware campaigns. Huntress noted that as of August 6, 2025, it had recorded at least 28 related incidents from this activity group.

Last year, Arctic Wolf highlighted that attackers, including those behind Akira and Fog, were actively scanning for unpatched SonicWall SSL VPNs vulnerable to CVE-2024-40766 — making patching and password hygiene more important than ever.

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch