LOGO

SonicWall SSLVPN Vulnerability: Urgent Security Alert

August 5, 2025
SonicWall SSLVPN Vulnerability: Urgent Security Alert

SonicWall Advises Disabling VPN Feature Amidst Ransomware Surge

SonicWall, a leading enterprise security firm, is recommending that its clientele deactivate a fundamental function within its latest series of firewall appliances. This advisory follows reports from security analysts indicating a rise in ransomware incidents specifically targeting SonicWall users.

Increased Security Incidents Reported

In a public statement released this week, SonicWall acknowledged a “notable increase” in security breaches affecting its Generation 7 firewalls, particularly those with the VPN feature activated. The company confirmed it is currently conducting a thorough investigation.

The investigation aims to ascertain whether these incidents are linked to a previously known security weakness or if a newly discovered vulnerability is the root cause.

Hackers Targeting SonicWall Devices

This alert from SonicWall coincides with findings from security researchers who have identified malicious actors actively targeting SonicWall devices to establish initial network access.

A growing trend sees hackers focusing on enterprise-level products, such as firewalls and VPNs, which serve as crucial digital access points. However, security flaws within these products can be exploited by attackers.

Evidence Suggests Zero-Day Vulnerability

Arctic Wolf, a security company, reports observing intrusions targeting SonicWall customers dating back to mid-July. Their analysis suggests “available evidence points to the existence of a zero-day vulnerability.”

A zero-day vulnerability is a security flaw that is exploited before the vendor has the opportunity to release a patch.

Rapid Ransomware Deployment

Researchers have noted a brief timeframe between the exploitation of the SonicWall firewall and the subsequent deployment of file-encrypting ransomware.

Domain Controller Access

Huntress Labs, another cybersecurity firm, believes a zero-day bug in SonicWall firewalls is “likely” responsible for the attacks. They also warn that attackers are gaining access to domain controllers.

Domain controllers manage devices and user accounts within a network, making them a critical target for malicious actors.

Akira Ransomware Gang Suspected

According to Huntress’s blog, the Akira ransomware gang is suspected of being behind some of the attacks targeting SonicWall customers. Akira is known for targeting enterprise products, including Fortinet firewalls, to infiltrate large networks.

Huntress emphasized that “This is a critical, ongoing threat.”

#SonicWall#SSLVPN#vulnerability#ransomware#security#cybersecurity