Security Bulletin text on the screen with a wolf in the background
Security Bulletin text on the screen with a wolf in the background

CVE-2025-40602: SonicWall Releases Fix for SMA1000 Privilege Escalation Zero-Day Under Active Attack

On 17 December 2025, SonicWall released fixes for an actively exploited medium-severity zero-day vulnerability in the SonicWall SMA1000 Appliance Management Console (AMC), tracked as CVE-2025-40602.
Security Bulletin text on the screen with a wolf in the background
6 min read

On 17 December 2025, SonicWall released fixes for an actively exploited medium-severity zero-day vulnerability in the SonicWall SMA1000 Appliance Management Console (AMC), tracked as CVE-2025-40602. The vulnerability allows local threat actors to escalate privileges due to insufficient authorisation in the SMA1000 AMC and does not affect SSL VPN functionality on SonicWall firewalls. SonicWall reported that threat actors have chained CVE-2025-40602 with CVE-2025-23006, a critical remote code execution vulnerability exploited earlier this year. 

Arctic Wolf has not observed a public proof-of-concept exploit for CVE-2025-40602. However, threat actors are likely to continue targeting this vulnerability due to the level of access it provides and its ability to be chained with CVE-2025-23006. SonicWall products have been heavily targeted this year, including a recent September incident in which threat actors stole MySonicWall configuration backup files. 

Recommendations for CVE-2025-40602

Upgrade to Latest Fixed Version

Arctic Wolf strongly recommends that customers upgrade to the latest fixed version. 

Product  Affected Version  Fixed Version 
SMA1000  12.4.3-03093 (platform-hotfix) and earlier versions. 

12.5.0-02002 (platform-hotfix) and earlier versions. 

12.4.3-03245 (platform-hotfix) and higher versions. 

12.5.0-02283 (platform-hotfix) and higher versions. 

 

Note: CVE-2025-40602 does not affect SSL-VPN running on SonicWall firewalls. 

Please follow your organisation’s patching and testing guidelines to minimise potential operational impact. 

Restrict Access to Appliance Management Console (AMC)

SonicWall recommends restricting access to the Appliance Management Console (AMC) to SSH connections originating only from a VPN or specific administrator IP addresses, and disabling both the SSL VPN management interface (AMC) and SSH access from the public internet. These practices reduce your attack surface against CVE-2025-40602 and other similar vulnerabilities that may arise in the future. 

References 

SonicWall Advisory

Share this post: