SonicWall has released a patch for a critical privilege escalation flaw (CVE-2025-40602) affecting its SMA 1000 appliances, which has been actively exploited. The vulnerability, combined with CVE-2025-23006, allows attackers to execute commands with root privileges, emphasizing the need for urgent updates. #CVE202540602 #CVE202523006 #SonicWall #SMA1000
Keypoints
- SonicWall issued a security update to fix a chained privilege escalation vulnerability on SMA 1000 appliances.
- The vulnerability was exploited in the wild, leveraging prior CVE-2025-23006 compromises in conjunction with CVE-2025-40602.
- Attackers can execute OS commands with root privileges due to insufficient authorization controls.
- Organizations are advised to upgrade their appliances to specific fixed versions and restrict console access.
- SonicWallβs security measures include disabling public internet access for admin interfaces and applying patches that break the exploit chain.
Read More: https://www.helpnetsecurity.com/2025/12/17/sonicwall-cve-2025-40602/