SonicWall released a security patch for a severe vulnerability (CVE-2025-40599) in its SMA 100 series secure access gateways. The device's web management interface contains a severe arbitrary file upload vulnerability, scoring 9.1 on the CVSS scale. Exploitation would allow attackers who have admin privileges to upload malicious files and achieve remote code execution (RCE). Although SonicWall says that there is no known exploitation of this specific bug in the wild, the urgency of the patch is increased by the recent attacks with Overstep malware on the same product line. The problem arises from a new Google report on UNC6148 threat group cyberattacks, which hacked fully patched SMA 100 devices using stolen admin credentials. The credentials were likely stolen before patching using known vulnerabilities like CVE-2025-32819 and CVE-2024-38475. Patched systems are therefore vulnerable if credentials were already hacked. The attackers utilized the credentials to drop Overstep malware, and therefore patching the software is not just the issue but also securing admin access. SonicWall strongly recommends that all organizations deploying SMA 100 series SMA 210, 410, and 500v deploy the latest patch (version 10.2.2.1-90sv) as soon as possible. In the case of SMA 500v virtual appliances, redeployment from scratch using a new OVA file is strongly recommended. Organizations also need to scan for UNC6148 indicators of compromise (IoCs) and reset potentially compromised credentials. SonicWall also remediated three additional high-severity vulnerabilities, which, although not exploited at this time, need to be remediated in advance.
A Chinese state-sponsored advanced persistent threat (APT) group has been linked to the compromise of a military organization based in the Philippines through the deployment of a n...
Cybersecurity experts have detected two new malware families: CHILLYHELL, a macOS backdoor with modularity, and ZynorRAT, a remote access trojan using Go for Windows and Linux syst...
Siemens has issued a critical security advisory regarding a newly discovered vulnerability in its SIMATIC Virtualization as a Service (SIVaaS) platform. Tracked as CVE-2025-40804, ...