SonicWall, a cybersecurity company, revealed a critical remote code execution vulnerability, known as CVE-2024-40766, in its SonicOS on August 22nd, 2024. This vulnerability raised concerns as it could potentially allow attackers to execute arbitrary code on vulnerable devices, leading to severe consequences such as data theft, network disruption, and other malicious activities.
Initially, there were no reports of active exploitation of this vulnerability. However, the situation took a concerning turn when an update on September 6th indicated the possibility of active attacks targeting this vulnerability. This development alarmed cybersecurity experts and organizations relying on SonicWall devices to secure their networks.
Recent incidents involving Akira ransomware affiliates exploiting vulnerabilities in SonicWall SSLVPN devices further underscored the urgency of addressing this issue. These attackers exploited weaknesses in the devices to compromise local accounts that lacked Multi-Factor Authentication (MFA), enabling unauthorized access to sensitive systems and data.
The affected devices were found to be running vulnerable versions of SonicOS firmware, making them susceptible to exploitation by malicious actors. To mitigate this risk, organizations were advised to promptly upgrade to the latest SonicOS firmware and enable MFA for all local SSLVPN accounts.
SonicWall took immediate action to address these security concerns by releasing updated firmware versions (5.9.2.14-13o and 6.5.2.8-2n/6.5.4.15.116n) for their firewalls. Users of these devices were strongly encouraged to update their firmware to the latest version to safeguard their systems against potential attacks.
Furthermore, SonicWall identified a security vulnerability in their Gen7 Firewalls running SonicOS versions 7.0.1-5035 and older, which could potentially allow unauthorized access to the firewall’s management interface. As a precautionary measure, users of these firewalls were urged to update to the latest SonicOS firmware version, 7.0.1-5072 or later, to reduce the risk of unauthorized access.
Additionally, users of Gen5 and Gen6 devices were advised to reset their SSLVPN account passwords to prevent unauthorized access. Administrators were instructed to enable the “User must change password” option for all locally managed accounts, ensuring that users reset their passwords upon their next login.
To enhance security, SonicWall recommended enabling Multi-Factor Authentication (MFA) for all local SSLVPN accounts on their firewalls. By following this advice and taking additional preventive measures such as disabling WAN management and SSLVPN access from the internet, organizations could significantly reduce the likelihood of unauthorized access and potential cyberattacks.
In conclusion, the vulnerability in SonicOS posed a significant threat to organizations using SonicWall devices for network security. Prompt action, such as upgrading firmware, enabling MFA, and implementing additional security measures, was crucial to mitigating the risks associated with this vulnerability and safeguarding against potential cyber threats.

