CVE-2025-23006
SonicWall SMA 8200v Appliance Schwachstellenanalyse und -minderung

Überblick

A critical vulnerability (CVE-2025-23006) was identified in SonicWall's SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC). The vulnerability, discovered on January 22, 2025, is a pre-authentication deserialization of untrusted data flaw that could allow remote unauthenticated attackers to execute arbitrary OS commands. The vulnerability affects SMA1000 series devices running version 12.4.3-02804 and earlier, including models SMA6200, SMA6210, SMA7200, SMA7210, SMA8200v, EX6000, EX7000, and EX9000 (SonicWall Advisory, NVD).

Technische Details

The vulnerability has been assigned a critical CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating its severe nature. It is classified as CWE-502 (Deserialization of Untrusted Data). The flaw specifically affects the management interfaces (AMC and CMC) of the SMA1000 series devices, where under specific conditions, the deserialization of untrusted data can lead to arbitrary OS command execution (NVD, SonicWall Advisory).

Aufprall

The vulnerability poses a significant security risk as it allows unauthenticated remote attackers to execute arbitrary OS commands on affected devices. According to Censys research, approximately 91 potentially vulnerable management interfaces were exposed to the internet at the time of discovery, with 42% of affected devices located in the United States (Censys).

Risikominderung und Problemumgehungen

SonicWall has released version 12.4.3-02854 (platform-hotfix) to address this vulnerability. As a workaround, organizations are advised to restrict access to trusted sources for the Appliance Management Console (AMC) and Central Management Console (CMC). For dual-homed appliances, access to administrative consoles (default TCP port 8443) should be limited to trusted internal networks via an internal interface only. For single-homed appliances, a firewall should be used to restrict access to administrative consoles (Arctic Wolf, SonicWall Advisory).

Zusätzliche Ressourcen


QuelleDieser Bericht wurde mithilfe von KI erstellt

Verwandt SonicWall SMA 8200v Appliance Schwachstellen:

CVE-Kennung

Strenge

Punktzahl

Technologieen

Name der Komponente

CISA KEV-Exploit

Hat fix

Veröffentlichungsdatum

CVE-2025-23006CRITICAL9.8
  • SonicWall SMA 8200v ApplianceSonicWall SMA 8200v Appliance
  • cpe:2.3:a:sonicwall:sma8200v
JaJaJan 23, 2025
CVE-2025-40602MEDIUM6.6
  • SonicWall SMA 8200v ApplianceSonicWall SMA 8200v Appliance
  • cpe:2.3:a:sonicwall:sma8200v
JaJaDec 18, 2025

Kostenlose Schwachstellenbewertung

Benchmarking Ihrer Cloud-Sicherheitslage

Bewerten Sie Ihre Cloud-Sicherheitspraktiken in 9 Sicherheitsbereichen, um Ihr Risikoniveau zu bewerten und Lücken in Ihren Abwehrmaßnahmen zu identifizieren.

Bewertung anfordern

Eine personalisierte Demo anfordern

Sind Sie bereit, Wiz in Aktion zu sehen?

"Die beste Benutzererfahrung, die ich je gesehen habe, bietet vollständige Transparenz für Cloud-Workloads."
David EstlickCISO
"„Wiz bietet eine zentrale Oberfläche, um zu sehen, was in unseren Cloud-Umgebungen vor sich geht.“ "
Adam FletcherSicherheitsbeauftragter
"„Wir wissen, dass, wenn Wiz etwas als kritisch identifiziert, es auch wirklich kritisch ist.“"
Greg PoniatowskiLeiter Bedrohungs- und Schwachstellenmanagement