SonicWall released a security patch for a severe vulnerability (CVE-2025-40599) in its SMA 100 series secure access gateways. The device's web management interface contains a severe arbitrary file upload vulnerability, scoring 9.1 on the CVSS scale. Exploitation would allow attackers who have admin privileges to upload malicious files and achieve remote code execution (RCE). Although SonicWall says that there is no known exploitation of this specific bug in the wild, the urgency of the patch is increased by the recent attacks with Overstep malware on the same product line. The problem arises from a new Google report on UNC6148 threat group cyberattacks, which hacked fully patched SMA 100 devices using stolen admin credentials. The credentials were likely stolen before patching using known vulnerabilities like CVE-2025-32819 and CVE-2024-38475. Patched systems are therefore vulnerable if credentials were already hacked. The attackers utilized the credentials to drop Overstep malware, and therefore patching the software is not just the issue but also securing admin access. SonicWall strongly recommends that all organizations deploying SMA 100 series SMA 210, 410, and 500v deploy the latest patch (version 10.2.2.1-90sv) as soon as possible. In the case of SMA 500v virtual appliances, redeployment from scratch using a new OVA file is strongly recommended. Organizations also need to scan for UNC6148 indicators of compromise (IoCs) and reset potentially compromised credentials. SonicWall also remediated three additional high-severity vulnerabilities, which, although not exploited at this time, need to be remediated in advance.
The Apache Software Foundation has issued a new security advisory detailing three vulnerabilities affecting Apache Kylin, a high-concurrency OLAP engine used widely in big data ana...
NVIDIA has released a critical security update to address several vulnerabilities discovered in its NVIDIA App software for Windows. These flaws, if exploited, could allow local at...
The security of the open-source supply chain was tested again when researchers from JFrog discovered a malicious PyPI package called SoopSocks (XRAY-725599). Ostensibly advertised ...