On 10 September 2025, the Australian Cyber Security Centre (ACSC) issued a high-severity alert about active exploitation of a critical SonicWall SSL VPN vulnerability (CVE-2024-40766). For Melbourne small and mid-sized businesses (SMBs), this is not a theoretical risk — it’s a direct threat. Attackers are using the flaw to gain initial access, move laterally, and deploy ransomware, with Akira affiliates already observed in the wild. While SonicWall released patches in 2024, exploitation continues where appliances remain unpatched or when migrated credentials were left unchanged.
Many SMBs still rely on on-premises VPN appliances for remote access. A compromised SSL VPN gives attackers a foothold inside your network — allowing lateral movement, privilege escalation, and ransomware deployment. The vulnerability has a high CVSS score, and active exploitation has been observed in Australia. For SMBs without enterprise-grade security operations, this is a critical business risk.
CVE-2024-40766 is an improper access control issue in SonicOS. Attackers exploit misconfigured or outdated devices — particularly where local SSL VPN accounts were retained during hardware migrations — to bypass protections. In some cases, exploitation also causes appliances to crash. SonicWall and ACSC advisories consistently cite two common failings: missing firmware patches and reused credentials.
Run RMM/config scans for all SonicWall Gen 5/6/7 appliances. Use vendor tools or Nessus/Tenable to identify internet-facing VPN endpoints and mark them as critical.
If VPNs aren’t required, disable them temporarily or restrict access via ACLs. Lock down management interfaces to trusted IPs only. Route logs into your SIEM/MSSP for monitoring.
Apply the latest SonicWall firmware updates. Reset all local SSL VPN accounts, especially those migrated between devices. Enforce MFA (TOTP or hardware tokens) for all VPN logins.
Hunt for unusual authentication attempts, lateral movement, or data exfiltration. Validate backup integrity. If compromise is suspected, follow your incident response runbook: contain, eradicate, recover, notify.
SMBs should consider moving away from internet-facing VPNs altogether, adopting modern Zero Trust or SASE models. Network segmentation, device lifecycle checks, and strict patching SLAs (e.g., 48-hour turnaround for critical updates) should become policy.
At Ex-tech Solutions, we’re conducting emergency SonicWall audits across Melbourne. Our team provides rapid patching, credential resets, MFA rollouts, and forensic monitoring. For businesses using SonicWall appliances, treat this as an incident, not a routine update.
If you’re unsure of your exposure, reach out today — our engineers can deliver a FREE emergency security audit and remediation plan to keep your business protected.
Ex-Tech eliminates the need for you to waste precious time and resources on the maintenance and upkeep of your IT infrastructure so you can focus on what’s paramount – the growth and success of your business. Ready to elevate your IT infrastructure? Contact us to schedule your FREE assessment today!