Advertisement

SonicWall pushes urgent patch for its SMA appliance

The flaw has a severity rating of 9.8 out of 10, and a patch has been made available.
Listen to this article
0:00
Learn more. This feature uses an automated voice, which may result in occasional errors in pronunciation, tone, or sentiment.
(Getty Images)

A critical security flaw has been identified and potentially exploited in SonicWall’s Secure Mobile Access (SMA) 1000 series appliances, sparking significant concern among cybersecurity experts and users worldwide. 

The vulnerability, registered as CVE-2025-23006, allows remote, unauthenticated attackers to execute arbitrary operating system commands under certain conditions. The issue specifically impacts the Appliance Management Console (AMC) and Central Management Console (CMC) used widely in enterprise and government networks for administrative functions.

SonicWall issued a warning Wednesday saying the flaw has a severity rating of 9.8 out of 10 by the Common Vulnerability Scoring System (CVSS), and may have been exploited by malicious actors. Microsoft’s Threat Intelligence Center is credited with uncovering the flaw, although it remains unclear when the exploitation might have commenced. Despite this, SonicWall’s advisory urges all SMA1000 users to upgrade immediately to the patched software version to prevent potential security breaches.

SonicWall’s products provide secure remote access for a wide swath of organizations, often serving managed security service providers (MSSPs), enterprises, and government agencies. 

Advertisement

While SonicWall has confirmed that its Firewall and SMA100 series — geared toward small to medium-sized businesses — remain unaffected by this vulnerability, the company advises proactive measures, such as restrictively managing console access as per its security best practices. 

Germany’s CERT-Bund has also issued advisories, echoing the urgency for immediate patch implementation. A search on Shodan, a search engine for internet-connected devices, indicates that approximately 2,380 SMA1000 devices currently have online exposure.

Further directions on how to secure SMA appliances can be found on SonicWall’s website.

Greg Otto

Written by Greg Otto

Greg Otto is Editor-in-Chief of CyberScoop, overseeing all editorial content for the website. Greg has led cybersecurity coverage that has won various awards, including accolades from the Society of Professional Journalists and the American Society of Business Publication Editors. Prior to joining Scoop News Group, Greg worked for the Washington Business Journal, U.S. News & World Report and WTOP Radio. He has a degree in broadcast journalism from Temple University.

Latest Podcasts