Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:
CYBER ALERT
Home / CYBER ALERT
/
Vulnerabilities in SonicWall Products (AL03/250123/CSIRT-ITA)

Vulnerabilities in SonicWall Products (AL03/250123/CSIRT-ITA)

Summary

A vulnerability rated “Critical” has been discovered in SonicWall Secure Mobile Access (SMA) 1000 Series products. This vulnerability, if successfully exploited, could allow a remote attacker to execute arbitrary code on the target devices.

Note: The vendor states that the vulnerability could be actively exploited over a network.

Risk

Community Impact Estimate: Critical (79.23)

Type

  • Remote Code Execution

Affected Products and/or Versions

SMA1000

  • Appliance Management Console (AMC), version 12.4.3-02804 (platform-hotfix) and earlier
  • Central Management Console (CMC), version 12.4.3-02804 (platform-hotfix) and earlier

Mitigation Actions

In line with the vendor’s statement, it is recommended that vulnerable products be updated as per the security bulletin in the References section.

CVE
CVE-2025-23006

References

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0002

1This estimate is made taking into account several parameters, including: CVSS, availability of patches/workarounds and PoC, diffusion of the affected software/devices in the reference community.

Recommended to you

Search in 365TRUST

Our services