Cyber Security News

SonicWall 0-day Vulnerability Exploited In Attacks Execute Arbitrary OS Commands

A critical security vulnerability, tracked as CVE-2025-23006, has been identified in SonicWall’s SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC). 

This flaw, classified under CWE-502 (Deserialization of Untrusted Data), carries a severity score of 9.8 (Critical), indicating its potential for a devastating impact. 

SonicWall has confirmed active exploitation of this vulnerability by malicious actors and urges immediate action to mitigate risks.

SonicWall VulnerabilityCVE-2025-23006

The vulnerability arises from improper handling of untrusted data during deserialization in the AMC and CMC components. Under specific conditions, this flaw enables remote, unauthenticated attackers to execute arbitrary operating system commands on affected devices.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

This could result in full system compromise, impacting confidentiality, integrity, and availability.

“Pre-authentication deserialization of untrusted data vulnerability has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), which in specific conditions could potentially enable a remote unauthenticated attacker to execute arbitrary OS commands”, reads the advisory.

Notably, this vulnerability does not affect SonicWall Firewall or SMA 100 series products. SonicWall’s Product Security Incident Response Team (PSIRT) has verified reports of active exploitation in the wild. 

Threat actors are leveraging this zero-day vulnerability to target unpatched systems, making it critical for affected organizations to act swiftly.

The vulnerability was discovered by the Microsoft Threat Intelligence Center (MSTIC), which promptly reported it to SonicWall.

SMA1000 Series running version 12.4.3-02804 or earlier. SonicWall has released a patched version (12.4.3-02854) to address the issue. Users are strongly advised to upgrade to this version or later immediately. 

As a temporary workaround, organizations should restrict access to the AMC and CMC interfaces to trusted sources only.

Recommendations

  • Upgrade Software: Install version 12.4.3-02854 or higher without delay.
  • Restrict Access: Limit AMC and CMC access to trusted IP addresses.
  • Monitor Systems: Employ network monitoring tools to detect unusual activity.

Given the critical nature of CVE-2025-23006 and its active exploitation, organizations using vulnerable versions of the SMA1000 series must prioritize patching and implementing mitigations immediately.

Failure to address this issue could lead to severe security breaches with widespread consequences.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Microsoft Introduces Researcher in 365 Copilot: Your Secure Virtual Assistant for Enhanced Productivity

Microsoft has launched Researcher with Computer Use in Microsoft 365 Copilot, marking a significant advancement…

19 minutes ago

Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads

A new wave of cyber threats is emerging as criminals increasingly weaponize AdaptixC2, a free…

2 hours ago

Hackers Weaponizing Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability

Chinese-affiliated threat actor UNC6384 has been actively leveraging a critical Windows shortcut vulnerability to target…

4 hours ago

Kimsuky and Lazarus Hacker Groups Unveil New Tools That Enable Backdoor and Remote Access

Threat actors operating under the control of North Korea's regime have demonstrated continued technical sophistication…

4 hours ago

Threat Actors Using Multilingual ZIP File to Attack Financial and Government Organizations

Sophisticated threat actors have orchestrated a coordinated multilingual phishing campaign targeting financial and government organizations…

5 hours ago

AzureHound Penetration Testing Tool Weaponized by Threat Actors to Enumerate Azure and Entra ID

AzureHound, an open-source data collection tool designed for legitimate penetration testing and security research, has…

5 hours ago