Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: The Getter Setter Getter

      September 12, 2025

      Low-Code vs No-Code Platforms for Node.js: What CTOs Must Know Before Investing

      September 12, 2025

      ServiceNow unveils Zurich AI platform

      September 12, 2025

      Integrating CSS Cascade Layers To An Existing Project

      September 11, 2025

      Distribution Release: GLF OS 25.05

      September 10, 2025

      Your guide to GitHub Universe 2025: The schedule just launched!

      September 10, 2025

      What’re Your Top 4 CSS Properties?

      September 10, 2025

      Distribution Release: Univention Corporate Server 5.2-3

      September 10, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Modernizing on Your Own Terms: A Strategic Guide to Managing Node.js Legacy Systems

      September 11, 2025
      Recent

      Modernizing on Your Own Terms: A Strategic Guide to Managing Node.js Legacy Systems

      September 11, 2025

      External Forces Reshaping Financial Services in 2025 and Beyond

      September 10, 2025

      Why It’s Time to Move from SharePoint On-Premises to SharePoint Online

      September 10, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Pironman 5 Max Review: Best Raspberry Pi Case Money can Buy

      September 12, 2025
      Recent

      Pironman 5 Max Review: Best Raspberry Pi Case Money can Buy

      September 12, 2025

      FOSS Weekly #25.37: Mint 22.2 Released, Official KDE Distro, Kazeta Linux for 90s Gaming, Ubuntu 25.10’s New Terminal and More Linux Stuff

      September 11, 2025

      Distribution Release: GLF OS 25.05

      September 10, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Australia Warns of Ransomware Attacks Exploiting SonicWall VPN Flaw CVE-2024-40766

    Australia Warns of Ransomware Attacks Exploiting SonicWall VPN Flaw CVE-2024-40766

    September 12, 2025

    CVE-2024-40766

    The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has issued an urgent alert regarding active exploitation of a critical security flaw identified as CVE-2024-40766, impacting multiple generations of SonicWall SSL VPN devices. According to the advisory, threat actors, including those deploying Akira ransomware, are actively leveraging this vulnerability to gain unauthorized network access and, in some cases, crash firewalls. 

    The vulnerability, officially tracked as CVE-2024-40766, was publicly disclosed in August 2024 through advisory ID SNWLID-2024-0015. It affects Gen 5, Gen 6, and Gen 7 SonicWall appliances running SonicOS 7.0.1-5035 and earlier versions. Classified as a CWE-284 Improper Access Control issue, the vulnerability has been assigned a CVSS v3 score of 9.3, signaling a high-severity risk. 

    “This vulnerability is potentially being exploited in the wild,” warns the official SonicWall advisory, urging users to apply security patches without delay. 

    Technical Details of CVE-2024-40766 

    The SonicWall SSL vulnerability allows attackers to bypass access controls, granting them unauthorized access to protected resources. Under certain conditions, exploitation can trigger firewall crashes, causing network outages.

    Although the issue is more prevalent in older firmware, recent exploitation cases have involved Gen 7 appliances, especially when configurations from earlier generations were migrated without updating user credentials. 

    SonicWall has confirmed that fewer than 40 incidents have been linked to this vulnerability, many stemming from organizations that transitioned from Gen 6 to Gen 7 devices without resetting local user passwords, a critical misstep that left systems exposed. 

    Mitigation Measures and Security Recommendations 

    In response to the active exploitation of CVE-2024-40766, both SonicWall and ASD’s ACSC have issued a set of comprehensive mitigation strategies aimed at minimizing exposure and reinforcing organizational defenses. 

    Firmware updates are the first and most critical step. Organizations using SonicWall devices must ensure their systems are updated to the latest secure versions. Specifically, Gen 5 devices should be upgraded to version 5.9.2.14-13o or later, Gen 6 devices to version 6.5.4.15.116n or later, and Gen 7 devices to version 7.3.0 or later. 

    Credential hygiene is also vital. All local SSL VPN user passwords should be reset immediately, especially in cases where user accounts were imported from older devices without proper credential updates. To streamline this process, SonicWall has released a bulk password reset script to assist administrators. 

    To further reduce the risk of unauthorized access, multi-factor authentication (MFA) should be enabled across all SonicWall SSL VPN accounts. The use of time-based one-time passwords (TOTP) or email-based one-time passcodes (OTP) can significantly mitigate the impact of compromised credentials. 

    Additionally, access restrictions should be implemented by limiting SSL VPN and WAN management access to only trusted IP addresses. If feasible, internet-facing access should be disabled entirely to reduce the attack surface. 

    Lastly, logging and monitoring are essential for early detection. Administrators are advised to enable event logging for all SSL VPN login attempts. Implementing account lockout mechanisms will help prevent brute-force attacks and alert security teams to suspicious login behavior. 

    Legacy Devices Remain Vulnerable 

    SonicWall has clarified that Gen 5 (excluding SOHO models) and NSA 2600 firewalls, both categorized as End-of-Life (EoL), will not receive security patches. These models remain exposed to active threats and should be retired or isolated from critical infrastructure. 

    “NSA 2600, Gen 5, and older units are susceptible to this exploit and will not be patched,” the company stated, emphasizing the urgency of replacing outdated hardware. 

    New Protections in SonicOS 7.3 

    To counter these threats, SonicWall has implemented new security enhancements in SonicOS 7.3, including brute-force detection, expanded MFA support, and improved admin account monitoring. However, these protections are only effective if updates are applied and configurations are actively managed. 

    Administrators are further encouraged to: 

    • Remove unused or dormant user accounts 
    • Audit and rotate LDAP login credentials 
    • Review recent configuration changes 
    • Examine local administrator logs for anomalies 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleFTC Urged to Investigate Microsoft on Outdated RC4 Encryption and Kerberoasting Flaws
    Next Article SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers

    Related Posts

    Development

    AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto

    September 12, 2025
    Development

    Are cybercriminals hacking your systems – or just logging in?

    September 12, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    GRUB: Quando Il Free e Open Source Software Non È Sempre Bene

    Linux

    CVE-2025-47757 – Adobe VSFT Out-of-Bounds Read Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Error’d: 8 Days a Week

    News & Updates

    I switched to $379 Android phone from my Pixel 9 Pro while traveling – and didn’t regret it

    News & Updates

    Highlights

    Development

    Scaling Smarter with Cloud ERP Solution – Driving Business Growth

    April 29, 2025

    Table of Contents Understanding a Cloud ERP Solution On-Premises ERP vs Cloud-based ERP Solution Cloud ERP Software Solution Components 5 Types of Cloud ERP Software Why Does Your Business Need a Cloud-based ERP Solution? How can Tx help ensure the Quality of Your Cloud ERP Solution? Summary Today’s businesses want to scale and expand their … Scaling Smarter with Cloud ERP Solution – Driving Business Growth
    The post Scaling Smarter with Cloud ERP Solution – Driving Business Growth first appeared on TestingXperts.

    CVE-2025-2504 – Apache HTTP Server Cross Site Scripting

    July 5, 2025

    EcoFlow’s new portable battery stations are lighter and more powerful (DC plug included)

    July 24, 2025

    HiAnime Not Working? 4 Easy Fixes to Get It Running Again

    August 28, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.