Loading HuntDB...

CVE-2024-40766

CRITICAL
Published 2024-08-23T06:19:07.229Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2024-40766. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
9.3
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L
Base Score Metrics
Exploitability: N/A Impact: N/A

EPSS Score

v2025.03.14
0.183
probability
of exploitation in the wild

There is a 18.3% chance that this vulnerability will be exploited in the wild within the next 30 days.

Updated: 2025-06-25
Exploit Probability
Percentile: 0.949
Higher than 94.9% of all CVEs

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
NONE
Availability
LOW

Description

An improper access control vulnerability has been identified in the SonicWall SonicOS management access, potentially leading to unauthorized resource access and in specific conditions, causing the firewall to crash. This issue affects SonicWall Firewall Gen 5 and Gen 6 devices, as well as Gen 7 devices running SonicOS 7.0.1-5035 and older versions.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

Known Exploited Vulnerability

This vulnerability is actively being exploited in the wild

View KEV Details

Remediation Status

Overdue

Due Date

September 30, 2024

Added to KEV

September 9, 2024

Required Action

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Affected Product

Vendor/Project: SonicWall
Product: SonicOS

Ransomware Risk

Known Ransomware Use
KEV Catalog Version: 2025.01.24 Released: January 24, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed CRITICAL

GHSA-8736-pr6r-r9hr

Advisory Details

An improper access control vulnerability has been identified in the SonicWall SonicOS management access, potentially leading to unauthorized resource access and in specific conditions, causing the firewall to crash. This issue affects SonicWall Firewall Gen 5 and Gen 6 devices, as well as Gen 7 devices running SonicOS 7.0.1-5035 and older versions.

CVSS Scoring

CVSS Score

9.0

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L

Advisory provided by GitHub Security Advisory Database. Published: August 23, 2024, Modified: September 6, 2024

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

9 posts
Reddit 1 week, 1 day ago
Backwoods_tech
Exploit

SONICWALL -- Repost, but just in case.... On August 5th, Sophos Managed Detection and Response (MDR) released an initial security advisory warning of potential zero-day exploitation in SonicWall SSLVPNs. Since then, new information has been provided by SonicWall. There have also been additional findings from Sophos' continued investigation into these …

26
17
60.0
View Original High Risk
Reddit 2 weeks ago
falconupkid
Exploit

SonicWall: Attackers did not exploit zero-day vulnerability to compromise Gen 7 firewalls Akira ransomware affiliates are not leveraging an unknown, zero-day vulnerability in SonicWall Gen 7 firewalls to breach corporate networks, the security vendor shared today. “Instead, there is a significant correlation with threat... **CVEs:** CVE-2024-40766 **Source:** https://www.helpnetsecurity.com/2025/08/07/sonicwall-gen-7-firewalls-exploit-vulnerability/

1
1.0
View Original High Risk
Reddit 2 weeks ago
falconupkid
Exploit

SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day SonicWall has revealed that the recent spike in activity targeting its Gen 7 and newer firewalls with SSL VPN enabled is related to an older, now-patched bug and password reuse. "We now have high confidence that the recent SSL …

1
1.0
View Original High Risk
Reddit 2 weeks, 1 day ago
k12techpro
Exploit

Security Watch 8/8/25 On K12TechPro, we've launched a weekly cyber threat intelligence and vulnerability newsletter with NTP and K12TechPro. We'll post the "public" news to k12sysadmin from each newsletter. For the full "k12 techs only" portion (no middle schoolers, bad guys, vendors, etc. allowed), log into [k12techpro.com](http://k12techpro.com) and visit the …

5
5.0
View Original High Risk
Reddit 2 weeks, 1 day ago
DarkAlman
Exploit

Sonicwall vulnerability current documentation + reports Summary of the blog posts about the latest threat for reading. Sonicwall has published recommended remediation steps: * Update firmware to version 7.3.0, which includes enhanced protections against brute force attacks and additional MFA controls. * **7.3 has a known issue with SNMP traps …

10
2
14.0
View Original High Risk
Reddit 2 weeks, 3 days ago
snwl_pm
Exploit

SonicWall SSL VPN Update - August 6 We wanted to circle back with the community and share where things stand regarding the recent action involving Gen 7 SonicWall firewalls with SSLVPN enabled. After a thorough investigation, we now have high confidence that this activity is not the result of a …

34
1
36.0
View Original High Risk
Reddit 2 weeks, 3 days ago
snwl_pm
Exploit

SonicWall SSL VPN Update - August 6 We wanted to circle back with the community and share where things stand regarding the recent action involving Gen 7 SonicWall firewalls with SSLVPN enabled. After a thorough investigation, we now have high confidence that this activity is not the result of a …

34
48
130.0
View Original High Risk
Reddit 2 weeks, 3 days ago
MuthaPlucka
Exploit

SonicWall Walks Back Zero Day notice on SSLVPN Here is a copy & paste of the email I just received: SonicWall® Product Notification Following our earlier communications, we want to share an important update on our ongoing investigation into the recent cyber activity involving Gen 7 and newer firewalls with …

62
54
170.0
View Original High Risk
Reddit 2 weeks, 3 days ago
MeatyMcSorley
Exploit

sonicwall zero-day update (2:30pm 8/6) [*https://www.sonicwall.com/support/notices/gen-7-and-newer-sonicwall-firewalls-sslvpn-recent-threat-activity/250804095336430*](https://www.sonicwall.com/support/notices/gen-7-and-newer-sonicwall-firewalls-sslvpn-recent-threat-activity/250804095336430) *We now have high confidence that the recent SSLVPN activity is* ***not connected to a zero-day vulnerability****. Instead, there is a significant correlation with threat activity related to CVE-2024-40766, which was previously disclosed and documented in our public advisory* [*SNWLID-2024-0015*](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0015)*.* *We are currently investigating …

37
79
195.0
View Original High Risk

References

Published: 2024-08-23T06:19:07.229Z
Last Modified: 2025-07-28T19:42:57.593Z
Copied to clipboard!