Loading HuntDB...

CVE-2025-23006

CRITICAL
Published 2025-01-23T11:37:41.148Z
Actions:

Remediation Guide

Expert-verified security guidance by HuntDB

Verified Solution

To remediate the vulnerability CVE-2025-23006 in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), the first step is to download the latest firmware version from the SonicWall website. This vulnerability affects versions 12.4.3-02804 (platform-hotfix) and earlier, so it's critical to update to a version later than this.

To download the latest firmware, navigate to the SonicWall website. Locate the 'Firmware Update' section and click on the download link for the SMA1000 series. Ensure that you download the correct firmware for your specific model.

Once the firmware is downloaded, log into the SMA1000 AMC using your administrator credentials. Navigate to the 'System' tab, then 'Firmware & Backups'. Click on 'Upload New Firmware', then select the firmware file you downloaded earlier. Click 'Upload' to start the firmware update process.

During the firmware update, the SMA1000 appliance will reboot. Do not interrupt this process as it could cause the appliance to become unresponsive or even damage the firmware. After the reboot, log back into the AMC and navigate to 'System' > 'Firmware & Backups' to verify that the new firmware version is displayed.

In addition to updating the firmware, it's also recommended to review and tighten the appliance's security settings. This includes disabling any unnecessary services, limiting the number of concurrent sessions, and implementing strong password policies.

Finally, regularly check the SonicWall PSIRT website for updates on this vulnerability and any new vulnerabilities that may affect your appliance. Regular patching and updating are key to maintaining the security of your network infrastructure.

In conclusion, the remediation of CVE-2025-23006 involves updating the firmware of the affected SMA1000 appliance to the latest version, reviewing and tightening security settings, and regularly checking for updates on the SonicWall PSIRT website.

CVSS Score

V3.1
9.8
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

EPSS Score

v2025.03.14
0.498
probability
of exploitation in the wild

There is a 49.8% chance that this vulnerability will be exploited in the wild within the next 30 days.

Updated: 2025-06-25
Exploit Probability
Percentile: 0.977
Higher than 97.7% of all CVEs

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

Pre-authentication deserialization of untrusted data vulnerability has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), which in specific conditions could potentially enable a remote unauthenticated attacker to execute arbitrary OS commands.

Available Exploits

No exploits available for this CVE.

Related News

SonicWall SMA Appliances Exploited in Zero-Day Attacks

Critical security flaw in SonicWall SMA 1000 appliances (CVE-2025-23006) exploited as a zero-day. Rated CVSS 9.8, patch immediately…

HackRead 2025-01-27 11:11
CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-23006 SonicWall SMA1000 Appliances Deserialization Vulnerability These types of vulnerabilities are fre…

Cisa.gov 2025-01-24 12:00
SonicWall warns of a critical CVE-2025-23006 zero-day likely exploited in the wild

SonicWall warns customers of a critical zero-day vulnerability in SMA 1000 Series appliances, likely exploited in the wild. SonicWall is waring customers of a critical security vulnerability, tracked as CVE-2025-23006 (CVSS score of 9,8) impacting its Secure …

Securityaffairs.com 2025-01-24 09:36
SonicWall Urges Immediate Patch for Critical CVE-2025-23006 Flaw Amid Likely Exploitation

SonicWall is alerting customers of a critical security flaw impacting its Secure Mobile Access (SMA) 1000 Series appliances that it said has been likely exploited in the wild as a zero-day. The vulnerability, tracked as CVE-2025-23006, is rated 9.8 out of a m…

Biztoc.com 2025-01-23 22:35
CVE-2025-23006: SonicWall Secure Mobile Access (SMA) 1000 Zero-Day Reportedly Exploited

A zero-day vulnerability in SonicWall’s Secure Mobile Access (SMA) 1000 was reportedly exploited in the wild according to researchers.BackgroundOn January 22, SonicWall published a security advisory (SNWLID-2025-0002) for a newly disclosed vulnerability in …

Tenable.com 2025-01-23 17:54

Affected Products

Known Exploited Vulnerability

This vulnerability is actively being exploited in the wild

View KEV Details

Remediation Status

Overdue

Due Date

February 14, 2025

Added to KEV

January 24, 2025

Required Action

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Affected Product

Vendor/Project: SonicWall
Product: SMA1000 Appliances

Ransomware Risk

Known Ransomware Use
KEV Catalog Version: 2025.01.24 Released: January 24, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed CRITICAL

GHSA-57r3-2prp-v2xh

Advisory Details

Pre-authentication deserialization of untrusted data vulnerability has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), which in specific conditions could potentially enable a remote unauthenticated attacker to execute arbitrary OS commands.

CVSS Scoring

CVSS Score

9.0

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: January 23, 2025, Modified: January 23, 2025

References

Published: 2025-01-23T11:37:41.148Z
Last Modified: 2025-07-28T19:42:26.365Z
Copied to clipboard!