Bitdefender MDR has observed a significant increase in malicious activity targeting SonicWall Gen 7 (and newer) firewalls with SSL VPN enabled. While initial observations suggested a likely zero-day vulnerability, SonicWall has since stated with high confidence that this activity correlates with CVE-2024-40766.
This vulnerability is an improper access control flaw in SonicOS management access and SSL VPN, first published in August 2024. Many observed incidents appear to be related to migrations from Gen 6 to Gen 7 firewalls where local user passwords were carried over but not subsequently reset, a critical step outlined in the original advisory. Threat actors are exploiting this to gain initial access, bypass MFA, establish persistence, move laterally, and were observed deploying Akira ransomware.
The Bitdefender MDR team has been working closely with our customers who use SonicWall devices. We are releasing this advisory to make sure all SonicWall users - including those not using our MDR service - have the necessary information to protect their systems.
This campaign is characterized by rapid exploitation and post-exploitation actions. Attackers are leveraging access to SonicWall SSL VPNs to breach internal networks, often pivoting directly to domain controllers within hours of initial compromise. The core issue is now understood to be related to CVE-2024-40766, an improper access control flaw in SonicOS management access and SSL VPN that can lead to unauthorized resource access and, in specific conditions, cause the firewall to crash.
A significant factor in observed incidents is the migration of configurations from Gen 6 to Gen 7 firewalls, where local user passwords were carried over and not subsequently reset, a step that was critical to reset according to the original advisory. SonicOS 7.3 includes enhanced protections against brute-force password and MFA attacks, which were more feasible in earlier versions. Even fully patched devices with MFA enabled have been compromised in some instances, suggesting an as-yet-unpublished authentication or session flaw or issues with the MFA enforcement itself.
Bitdefender MDR has noted at least one incident in August 2025 that mirrors the widely reported activity, with previous incidents between June and August 2025 involving similar SonicWall firewall exploits as an attack vector or part of the attack chain. Earlier malicious VPN logins have been observed since at least October 2024.
(Note: A separate, ongoing campaign by UNC6148 is also targeting end-of-life SonicWall Secure Mobile Access (SMA) 100 series appliances with a tailored backdoor named OVERSTEP, leveraging stolen credentials and OTP seeds. This advisory primarily focuses on the Gen 7 firewall activity.)
1. Update Firmware to Version 7.3.0: Immediately update all affected SonicWall Gen 7 firewalls to firmware version 7.3.0. This version includes enhanced protections against brute-force and MFA attacks.
2. Reset All Local User Passwords: Reset all local user account passwords for accounts with SSL VPN access, especially those that were carried over during a migration from Gen 6 to Gen 7 firewalls. Rotate all VPN credentials, including both local user and LDAP account passwords used for Active Directory integration.
3. Disable SSL VPN Services (if possible): If not business-critical, strongly consider disabling SSL VPN access on your SonicWall appliances until a patch or definitive guidance is available.
4. Restrict SSL VPN Access: If disabling is not feasible, immediately restrict access to a minimal allow-list of known, trusted IP addresses.
5. Audit and Secure Privileged Accounts: Ensure any service accounts (e.g., sonicwall, LDAPAdmin) follow the principle of least privilege and are NOT Domain Admins. Remove any inactive or unused local firewall user accounts, particularly those with SSLVPN access.
6. Enforce Multi-Factor Authentication (MFA): Ensure MFA is enabled for all remote access to reduce the risk of credential abuse. While reports indicate MFA alone may not always prevent compromise in this campaign due to the specific nature of the vulnerability, it remains a critical defense layer.
7. Enable Security Services: Activate services such as Botnet Protection and Geo-IP Filtering on your SonicWall firewall to help detect and block known threat actors targeting SSL VPN endpoints.
8. For GravityZone users, enable Ransomware Mitigation policies as soon as possible. If you have GravityZone PHASR deployed, look for detections from Living Off The Land and Remote Admin Tools activity types.
Bitdefender MDR and Labs teams are continuously monitoring this threat and will provide updates as new information becomes available as well as developing and deploying detection signatures within our Endpoint Detection and Response (EDR) solutions based on emerging threats and telemetry.
tags
Martin is technical solutions director at Bitdefender. He is a passionate blogger and speaker, focusing on enterprise IT for over two decades. He loves travel, lived in Europe, Middle East and now residing in Florida.
View all postsDon’t miss out on exclusive content and exciting announcements!