Patch now! Attackers attack firewalls from Sonicwall

It is now clear that a vulnerability affects not only SonicOS, but also the SSLVPN function. Security updates are available.

listen Print view
Alarm triangle on screen

(Image: solarseven/Shutterstock.com)

2 min. read

Due to current attacks, network admins should update their Sonicwall firewalls immediately and change passwords of SSLVPN users. If this is not done, attackers can cause firewalls to crash.

The "critical" vulnerability (CVE-2024-40766) has been known since the end of August 2024. The manufacturer has now revised the warning message and warns against actively exploiting the vulnerability to attack devices. In addition to SonicOS, the vulnerability also affects the SSLVPN component, the developers explain.

Videos by heise

Because access controls do not work reliably, attackers can gain access for a DoS attack in an unspecified way and thus take firewalls out of service. Devices from the Gen5, Gen6 and Gen7 series up to and including firmwares 5.9.2.14-12o, 6.5.4.14-109n and 7.0.1-5035 are affected.

Sonicwall assures to have closed the vulnerability in the following releases:

  • 5.9.2.14-13o
  • 6.5.2.8-2n (for SM9800, NSsp 12400, NSsp 12800)
  • 6.5.4.15.116n (for other Gen6 firewall appliances)
  • Firmwares more up-to-date than 7.0.1-5035

As the manufacturer has now discovered, the SSLVPN feature is also affected by the vulnerability in addition to SonicOS. As a result, admins should set up accounts immediately and ensure that SSLVPN users change their password. In addition, multi-factor authentication should be activated.

Sonicwall does not currently list how admins can recognize systems that have already been attacked. The warning message also lacks information on Indicators of Compromise (IoC), i.e. information on how to recognize a successful attack or attempt. The extent of the attacks is currently unknown.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.