skip navigation
skip mega-menu

Security Bulletin: Actively Exploited Vulnerability in SonicWall

On January 22, 2025, SonicWall published a security advisory detailing an actively exploited remote command execution vulnerability in SMA1000 appliances. The critical-severity vulnerability, CVE-2025-23006, is a pre-authentication deserialization of untrusted data vulnerability that has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC). If exploited, it could allow unauthenticated remote threat actors to execute arbitrary OS commands. Arctic Wolf has not observed any publicly available proof of concept (PoC) exploits for this vulnerability.


Arctic Wolf strongly recommends that customers upgrade to the latest fixed version. 

Product

Affected Version

Fixed Version

SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC)

Version 12.4.3-02804 and earlier

Version 12.4.3-02854

Impacted Models: SMA6200, SMA6210, SMA7200, SMA7210, SMA8200v (ESX, KVM, Hyper-V, AWS, Azure), EX6000, EX7000, EX9000

Note: SonicWall Firewall and SMA 100 (SMA200, 210, 400, 410, and 500v) products are not affected by this vulnerability. 

Please follow your organization's patching and testing guidelines to minimize potential operational impact.

Subscribe to our newsletter

Sign up here