Sonicwall Netextender: Security leaks jeopardize Windows client

Sonicwall warns of security vulnerabilities in the Netextender Windows client. Attackers can extend their rights, for example.

listen Print view
Matrix image in dark blue tones

(Image: ArtSpace0714/Shutterstock.com)

2 min. read

There are security gaps in the VPN software Netextender that could allow attackers to extend their rights, for example. Manufacturer Sonicwall is currently issuing a warning about this.

In the security announcement, the Sonicwall developers write that the Windows client of the SSL VPN software Netextender is particularly affected. The greatest risk comes from inadequate rights management in Sonicwall Netextender Windows, both in the 32-bit and 64-bit versions. Attackers with low privileges can change configurations (CVE-2025-23008, CVSS 7.2, risk"high").

Malicious actors can also manipulate file paths. This is based on a vulnerability of the type "link resolution before file access" or "link tracing", as Sonicwall writes (CVE-2025-23010, CVSS 6.5, risk"medium"). A third vulnerability allows attackers to escalate their privileges and thereby delete arbitrary files on the system (CVE-2025-23009, CVSS 5.9, risk "medium").

Videos by heise

Sonicwall currently has no knowledge of any of these vulnerabilities being abused. Nevertheless, the manufacturer urgently advises users of the Sonicwall Netextender Windows client to update to the bug-fixed software version. Netextender Windows, 32- and 64-bit, version 10.3.2 and newer, fixes the vulnerabilities.

As Sonicwall vulnerabilities can usually give attackers access to networks, these vulnerabilities are very popular with cybercriminals. In mid-February, for example, attackers targeted Sonicwall firewalls. Shortly after the publication of proof-of-concept code for a security vulnerability (CVE-2024-53704, risk"high"), the attacks on this security leak became known. Anyone using Sonicwall products should therefore install the available updates as soon as possible.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.