CVE-2024-40766 is a critical (CVSS v3 score: 9.3) access control flaw. Its primary danger comes from the potential for providing unauthorized network access, both allowing attackers unfettered access to critical resources and, in some cases, giving attackers the ability to crash the firewall.
CVE-2024-40766 affects SonicWall devices using a vulnerable SonicOS firmware version, specifically SonicWall Firewall Gen 5, Gen 6, and Gen 7 devices.
SonicWall has released a list of impacted products and versions alongside releases for CVE-2024-40766:
SonicWall has released several suggested mitigations in addition to the fixes above.
For additional information on configuring MFA, check out SonicWall’s Knowledge Base here.
While SonicWall originally indicated that there was no active exploitation of this vulnerability when it was publicly reported on August 22nd, 2024, that didn’t last long. By September 6th, 2024, SonicWall updated its security advisory to include that the issue was potentially being exploited in the wild.
The same day, security researchers at Arctic Wolf reported that threat actors, specifically the Akira ransomware affiliates, have begun actively exploiting this vulnerability to deliver ransomware. Specifically, attackers were observed using compromised SSLVPN user accounts on SonicWall devices as the initial access vectors for ransomware, taking advantage of accounts that were not integrated in a centralized authentication solution and lacked MFA.
CyCognito discovery and testing engines detect all assets running SonicWall SonicOS products and leverage multiple tests to services of the vulnerable product and versions.
Figure 1: The alert sent by CyCognito for CVE-2024-40766
All customers have access to an in-platform emerging security issue announcement as of September 10th, 2024. The CyCognito platform uses both passive scanning and active testing techniques to identify vulnerable assets.
CyCognito is an exposure management platform that reduces risk by discovering, testing and prioritizing security issues. The platform scans billions of websites, cloud applications and APIs and uses advanced AI to identify the most critical risks and guide remediation. Emerging companies, government agencies and Fortune 500 organizations rely on CyCognito to secure and protect from growing threats. Want to see how it works? Check out our website and explore our platform with a self-guided, interactive dashboard product tour. To learn how CyCognito can help you understand your external attack surface and exposed risks, please visit our Contact Us page to schedule a demo.
Emma Zaballos is an avid threat researcher who is passionate about understanding and combatting cybercrime threats. Emma enjoys monitoring dark web marketplaces, profiling ransomware gangs, and using intelligence for understanding cybercrime.
Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.
Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.
Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.
Discover insights on application security, exposure management and other key topics below.
The definitive guide to attack surface management. Learn everything you need to know to reduce your cyber security risk with attack surface management.
Exposure management is a set of processes which allow organizations to assess the visibility, accessibility, and risk factors of their digital assets.
Vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in a system.
Explore CyCognito modules ASM, AST and EI in the resources below.
Scalable, continuous, and comprehensive testing for all external assets, all the time.
CyCognito Automated Security Testing dynamically applies payload-based testing techniques across your entire external attack surface.
CyCognito Exploit Intelligence uses threat intelligence about attackers’ behavior and exploitability for enhanced prioritization.