Urgent Security Alert from Australian Cyber Security Centre
The Australian Signals Directorate’s Australian Cyber Security Centre (ACSC) has raised an alarm regarding serious security vulnerabilities affecting SonicWall SSL VPN devices. Known as CVE-2024-40766, this critical flaw is being actively exploited by cybercriminals, including groups deploying Akira ransomware. The breach allows unauthorized access to networks and can, in certain conditions, crash firewalls.
Understanding the Vulnerability
CVE-2024-40766 was publicly disclosed in August 2024 through advisory SNWLID-2024-0015. This vulnerability affects several generations of SonicWall appliances, specifically Gen 5, Gen 6, and Gen 7 models running on SonicOS versions 7.0.1-5035 and earlier. The flaw is categorized as a CWE-284 Improper Access Control issue, boasting a CVSS v3 score of 9.3, which indicates a high-severity risk.
Recent threat analysis suggests that this vulnerability is not merely theoretical; it is currently being exploited by attackers, as noted in SonicWall’s advisory. Consequently, users are urged to implement security patches immediately.
Technical Insights on CVE-2024-40766
The underlying issue with the SonicWall SSL vulnerability permits attackers to bypass existing access controls, allowing them to gain unrestricted access to secured resources. Exploitation of this vulnerability can even lead to crashes of the firewall, impacting overall network stability.
While older firmware versions are notably more at risk, there have been exploits relating to Gen 7 appliances, especially among those that inherited configurations from previous generations without updating user credentials. Reports indicate that fewer than 40 incidents have been identified, primarily arising from organizations that upgraded from Gen 6 to Gen 7 without resetting local user passwords, a crucial oversight that left their systems vulnerable.
Recommendations for Mitigation
In light of the ongoing exploitation of CVE-2024-40766, SonicWall and ACSC have outlined several mitigation strategies to help organizations protect themselves.
Update Firmware
The first line of defense is updating firmware. Organizations utilizing SonicWall devices should ensure they are running the latest secure versions—Gen 5 devices must be upgraded to at least version 5.9.2.14-13o, Gen 6 to 6.5.4.15.116n, and Gen 7 devices should operate on version 7.3.0 or newer.
Improve Credential Security
Immediately resetting all local user passwords within the SSL VPN is critical, particularly for accounts transitioned from older models. To assist in this process, SonicWall has made available a bulk password reset script for administrators.
Enable Multi-Factor Authentication
To enhance security, enable multi-factor authentication across all SonicWall SSL VPN accounts. Utilizing options like time-based one-time passwords (TOTP) or email-based one-time passcodes can significantly reduce the chances of unauthorized access due to compromised credentials.
Restrict Access
Implementing access restrictions is another effective strategy. Limit SSL VPN and WAN management access to trusted IP addresses, and if possible, eliminate internet-facing access to narrow the potential attack surface.
Logging and Monitoring
Establishing comprehensive logging and monitoring processes is crucial for early threat detection. Administrators should enable event logging for all SSL VPN login attempts and implement account lockout measures to counter brute-force attacks, informing security teams about suspicious login activities.
Legacy Devices: A Continued Risk
SonicWall has made it clear that certain older devices, specifically Gen 5 models (excluding SOHO versions) and NSA 2600 firewalls classified as End-of-Life (EoL), will not receive any security patches. Consequently, these devices remain susceptible to ongoing threats and should be retired or at the very least isolated from critical systems.
Enhancements in SonicOS 7.3
To offer better protection against such vulnerabilities, SonicWall has introduced new security features in SonicOS 7.3, including enhanced brute-force detection, expanded support for multi-factor authentication, and improved monitoring capabilities for administrative accounts. However, these protections only work effectively if updates are applied, and the configurations are actively managed.
Best Practices for Administrators
To bolster overall security, administrators should also engage in routine maintenance practices, like:
- Removing inactive user accounts
- Auditing and updating LDAP credentials regularly
- Reviewing recent changes to device configurations
- Analyzing local admin logs for any anomalies
By taking these proactive measures, organizations can better protect themselves against the potential fallout from CVE-2024-40766 and similar vulnerabilities.


