SonicWall & Apache Vulnerabilities: CISA’s Latest Additions to the “Oh No, Not Again” List

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added SonicWall SMA100 and Apache HTTP Server flaws to its Known Exploited Vulnerabilities catalog. These vulnerabilities could allow attackers unauthorized access and command injection, proving once again that cyber threats never take a vacation, even if your firewall does.

Pro Dashboard

Hot Take:

Looks like the digital villains have been busy plotting their next heist, and CISA is on the case! With SonicWall and Apache joining the “Hall of Exploited Fame,” it’s time for IT departments to grab their superhero capes and patch up faster than a leaky boat in a shark-infested sea. Remember folks, in the world of cybersecurity, procrastination is not a virtue—it’s a vulnerability!

Key Points:

  • SonicWall SMA100 appliances and Apache HTTP server vulnerabilities have been added to CISA’s Known Exploited Vulnerabilities catalog.
  • Vulnerabilities include CVE-2024-38475 with a CVSS score of 9.8, and CVE-2023-44221 with a CVSS score of 7.2.
  • The vulnerabilities allow URL mapping to file systems and OS command injection, respectively.
  • Fixed firmware versions have been released for affected SonicWall devices.
  • CISA has set a May 22, 2025 deadline for federal agencies to address these vulnerabilities.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?