Actively exploited SonicWall zero-day patched (CVE-2025-40602)

Help Net Security
Actively Exploited

Overview

SonicWall has issued a hotfix for a local privilege escalation vulnerability, identified as CVE-2025-40602, that affects its Secure Mobile Access (SMA) 1000 appliances. This flaw is currently being exploited by attackers, particularly in combination with another vulnerability, CVE-2025-23006, which allows for unauthenticated remote code execution with root privileges. Organizations using SMA 1000 appliances are at risk, as this could enable unauthorized access and control over their systems. SonicWall is urging all customers to apply the patch promptly to mitigate the risk of exploitation. The situation highlights the ongoing need for vigilance and timely updates in cybersecurity practices.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: SonicWall Secure Mobile Access (SMA) 1000 appliances
  • Action Required: Customers are advised to apply the hotfix provided by SonicWall to address the vulnerability.
  • Timeline: Newly disclosed

Original Article Summary

SonicWall has patched a local privilege escalation vulnerability (CVE-2025-40602) affecting its Secure Mobile Access (SMA) 1000 appliances and is urging customers to apply the provided hotfix, as the flaw is being leveraged by attackers. “This vulnerability was reported to be leveraged in combination with CVE-2025-23006 to achieve unauthenticated remote code execution with root privileges,” the company said. About CVE-2025-40602 SonicWall Secure Mobile Access (SMA) 1000 appliances/gateways are used by large, distributed enterprises to allow employees … More → The post Actively exploited SonicWall zero-day patched (CVE-2025-40602) appeared first on Help Net Security.

Impact

SonicWall Secure Mobile Access (SMA) 1000 appliances

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Newly disclosed

Remediation

Customers are advised to apply the hotfix provided by SonicWall to address the vulnerability.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to CVE, Zero-day, Vulnerability, and 2 more.

Related Coverage

EU cybersecurity standards are at risk if supplier ban passes

Help Net Security

The European Telecommunications Standards Institute (ETSI) has submitted a position paper to the European Commission regarding the proposed Cybersecurity Act 2 (CSA2). The paper raises concerns about two key provisions: expanding the European Union Agency for Cybersecurity's (ENISA) role in setting technical standards and a proposed ban on entities from countries deemed to pose cybersecurity risks from participating in European standardization efforts. This ban could impact the development of cybersecurity standards in the EU, potentially limiting collaboration and innovation. The ETSI argues that such restrictions could hinder the overall effectiveness of European cybersecurity measures, affecting businesses and consumers alike. The outcome of this proposal will be significant for the future of cybersecurity in Europe.

Apr 16, 2026

UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

The Hacker News

Ukraine's Computer Emergencies Response Team (CERT-UA) has reported a new malware campaign targeting government and healthcare institutions, particularly clinics and emergency hospitals. This campaign, which took place between March and April, focuses on stealing sensitive data from users of Chromium-based web browsers and WhatsApp. The attackers are believed to be exploiting vulnerabilities to deliver this data-theft malware, raising concerns about the security of critical health information and government data. With healthcare systems already strained, this type of cyberattack poses significant risks not only to patient privacy but also to the overall functioning of essential services in Ukraine. The ongoing conflict and instability in the region make this situation particularly alarming, as attackers may aim to cause further disruption.

Apr 16, 2026

Middle East-based brute-force cyber intrusions surge

SCM feed for Latest

Cybersecurity researchers have reported a significant increase in brute-force authentication attacks targeting network devices, particularly in the Middle East. In the first quarter of 2026, nearly 90% of these intrusions originated from that region. This surge in attacks raises concerns for organizations relying on network devices for their operations, as attackers are likely exploiting weak passwords to gain unauthorized access. The alarming trend suggests that companies need to reinforce their security measures, including implementing stronger password policies and multi-factor authentication. With the rising frequency of these attacks, vigilance is essential to protect sensitive data and maintain network integrity.

Apr 15, 2026

New AgingFly malware used in attacks on Ukraine govt, hospitals

BleepingComputer

Researchers have discovered a new type of malware called 'AgingFly' that has been used in attacks targeting Ukrainian government agencies and hospitals. This malware is designed to steal authentication data from users of Chromium-based browsers and WhatsApp messenger, posing a significant risk to sensitive information. The attacks raise concerns about the security of critical infrastructure and public services, especially in a region already facing geopolitical tensions. As cybercriminals continue to evolve their tactics, it's crucial for organizations to enhance their defenses against such threats. Users are advised to be vigilant and consider updating their security practices to protect against potential data breaches.

Apr 15, 2026

Critical MCP Integration Flaw Puts NGINX at Risk

darkreading

A serious vulnerability has been discovered in nginx-ui, which could allow attackers to manipulate NGINX configuration files. This flaw has a near-maximum severity rating, meaning it poses a significant risk to users of the software. Attackers can exploit this weakness to restart, create, modify, or delete configuration files, potentially disrupting web services and compromising server security. This vulnerability affects anyone using nginx-ui, making it crucial for system administrators to take action. The situation is urgent as it could lead to unauthorized access and control over server configurations.

Apr 15, 2026

WordPress plugin suite hacked to push malware to thousands of sites

BleepingComputer

A significant cybersecurity incident has emerged involving over 30 plugins from the EssentialPlugin package for WordPress. These plugins have been compromised with malicious code, which grants unauthorized access to websites that utilize them. This breach potentially affects thousands of sites, putting user data and site integrity at risk. The incident underscores the vulnerability of widely-used plugins and the importance of maintaining updated security practices. Website administrators are urged to review their installed plugins and take immediate action to protect their sites from possible exploitation.

Apr 15, 2026