SonicWall’s Big Oops: Akira Ransomware Exploits Critical Firewall Flaw

Akira ransomware affiliates are exploiting a critical RCE vulnerability in SonicWall firewalls, prompting CISA to add CVE-2024-40766 to its KEV catalog. This bug in SonicOS allows attackers to gain control of affected devices. SonicWall urges immediate updates and recommends MFA for SSLVPN users to prevent unauthorized access.

Pro Dashboard

Hot Take:

***Looks like hackers have found yet another way to crash the party, and this time they’re coming through the firewall. If SonicWall devices were bouncers, they’d be letting everyone in without checking IDs.***

Key Points:

– SonicWall disclosed and patched a critical RCE vulnerability in Gen 5, Gen 6, and some Gen 7 firewall products.
– CISA added the vulnerability (CVE-2024-40766) to its KEV catalog and set a deadline for FCEB agencies to address it.
– The vulnerability allows attackers to gain complete control of affected devices and possibly crash them.
– Akira ransomware affiliates have been exploiting the vulnerability, targeting local SSLVPN accounts.
– SonicWall recommends immediate updates, limiting management functions to trusted sources, and enabling MFA.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?