• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances

You are here: Home / General Cyber Security News / SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances
December 17, 2025

SonicWall has rolled out fixes to address a security flaw in Secure Mobile Access (SMA) 100 series appliances that it said has been actively exploited in the wild.

The vulnerability, tracked as CVE-2025-40602 (CVSS score: 6.6), concerns a case of local privilege escalation that arises as a result of insufficient authorization in the appliance management console (AMC).

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


It affects the following versions –

  • 12.4.3-03093 (platform-hotfix) and earlier versions – Fixed in 12.4.3-03245 (platform-hotfix)
  • 12.5.0-02002 (platform-hotfix) and earlier versions – Fixed in 12.5.0-02283 (platform-hotfix)

Cybersecurity

“This vulnerability was reported to be leveraged in combination with CVE-2025-23006 (CVSS score 9.8) to achieve unauthenticated remote code execution with root privileges,” SonicWall said.

It’s worth noting that CVE-2025-23006 was patched by the company in late January 2025 in version 12.4.3-02854 (platform-hotfix).

Clément Lecigne and Zander Work of Google Threat Intelligence Group (GTIG) have been credited with discovering and reporting CVE-2025-40602. There are currently no details on the scale of the attacks and who is behind the efforts.

Back in July, Google said it’s tracking a cluster named UNC6148 that’s targeting fully-patched end-of-life SonicWall SMA 100 series devices as part of a campaign designed to drop a backdoor called OVERSTEP. It’s currently not clear if these activities are related.

In light of active exploitation, it’s essential that SonicWall SMA 100 series users apply the fixes as soon as possible.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «kimwolf botnet hijacks 1.8 million android tvs, launches large scale ddos Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances
  • Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
  • APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign
  • New ForumTroll Phishing Attacks Target Russian Scholars Using Fake eLibrary Emails
  • Fix SOC Blind Spots: See Threats to Your Industry & Country in Real Time
  • China-Linked Ink Dragon Hacks Governments Using ShadowPad and FINALDRAFT Malware
  • GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads
  • Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign
  • Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data
  • Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure

Copyright © TheCyberSecurity.News, All Rights Reserved.