SonicWall’s Zero-Day Nightmare: Update Now or Risk Remote Hijacking!
SonicWall has confirmed its SMA 1000 series products are vulnerable to a zero-day flaw exploited in the wild. Known as CVE-2025-23006, this untrusted data deserialization issue allows remote command execution. SonicWall urges immediate firmware updates. Don’t let your firewall become a “fire” invitation!

Hot Take:
Looks like SonicWall’s SMA 1000 series products are feeling a bit too “secure” for comfort these days. When your appliance management console is more welcoming to hackers than a free buffet, you know it’s time to patch things up. Here’s a tip, SonicWall: maybe don’t leave the front door wide open for remote command execution without authentication.
Key Points:
- A critical zero-day vulnerability in SonicWall’s SMA 1000 series allows remote command execution without authentication.
- This vulnerability, tracked as CVE-2025-23006, has already been exploited in the wild.
- SonicWall has released a patch in version 12.4.3-02854 to fix the issue.
- Roughly 2,000 to 4,000 internet-exposed SMA appliances are potentially vulnerable, but only 215 show signs of the exploit exposure.
- CISA has added this vulnerability to its Known Exploited Vulnerabilities catalog.
Already a member? Log in here