Article Details

Original Article Text

Click to Toggle View

SonicWall warns of critical access control flaw in SonicOS. SonicWall's SonicOS is vulnerable to a critical access control flaw that could allow attackers to gain access unauthorized access to resources or cause the firewall to crash. The flaw has received the identifier CVE-2024-40766 and a severity score of 9.3 according to the CVSS v3 standard, based on its network-based attack vector, low complexity, no authentication, and no user interaction requirements. "An improper access control vulnerability has been identified in the SonicWall SonicOS management access, potentially leading to unauthorized resource access and in specific conditions, causing the firewall to crash," reads SonicWall's bulletin. "This issue affects SonicWall Firewall Gen 5 and Gen 6 devices, as well as Gen 7 devices running SonicOS 7.0.1-5035 and older versions." Specific models impacted are:  It is recommended that system administrators move to the below versions, which address CVE-2024-40766: The security updates have been made available for download through mysonicwall.com. Those who cannot apply the fixes immediately are recommended to restrict firewall management access to trusted sources or disable WAN management access from the internet. More information on how to do this can be found on SonicWall's help page. SonicWall firewalls are widely used in a broad range of mission-critical industries and corporate environments and are commonly targeted by threat actors to gain initial access to corporate networks. In March 2023, suspected Chinese hackers tracked as UNC4540 attacked SonicWall Secure Mobile Access (SMA) appliances with custom malware that could persist through firmware upgrades. The US Cybersecurity & Infrastructure Security Agency (CISA) has warned about active exploitation of flaws impacting SonicWall appliances since 2022.

Daily Brief Summary

MALWARE // SonicWall Alerts Users to Critical SonicOS Access Control Flaw

SonicWall has identified a critical access control flaw in its SonicOS, labeled as CVE-2024-40766 with a CVSS v3 severity score of 9.3.

The vulnerability allows unauthorized access to resources and can cause firewall crashes without requiring user interaction or authentication.

Affected models include SonicWall Firewall Gen 5, Gen 6, and some Gen 7 devices running older firmware versions.

Administrators are urged to download security updates from mysonicwall.com to mitigate the risks associated with this flaw.

As a temporary measure, restricting firewall management access to trusted sources or disabling WAN management is recommended.

SonicWall products are essential in many industries and are often targeted by hackers; a recent example involved suspected Chinese hackers using custom malware.

The US Cybersecurity & Infrastructure Security Agency (CISA) has previously warned about the exploitation of vulnerabilities in SonicWall appliances.