Arctic Wolf Security Bulletin
Arctic Wolf Security Bulletin

CVE-2025-23006: Actively Exploited Vulnerability in SonicWall SMA1000 Appliances

CVE-2025-23006, is a pre-authentication deserialization of untrusted data vulnerability identified in the SMA1000 Appliance Management Console and Central Management Console. Find Arctic Wolf’s recommendations.
Arctic Wolf Security Bulletin
6 min read

On January 22, 2025, SonicWall published a security advisory detailing an actively exploited remote command execution vulnerability in SMA1000 appliances. The critical-severity vulnerability, CVE-2025-23006, is a pre-authentication deserialization of untrusted data vulnerability that has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC). If exploited, it could allow unauthenticated remote threat actors to execute arbitrary OS commands. Arctic Wolf has not observed any publicly available proof of concept (PoC) exploits for this vulnerability. 

Recommendation 

Upgrade to Latest Fixed Version

Arctic Wolf strongly recommends that customers upgrade to the latest fixed version. 

Product  Affected Version  Fixed Version 
SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC)  Version 12.4.3-02804 and earlier  Version 12.4.3-02854 
Impacted Models: SMA6200, SMA6210, SMA7200, SMA7210, SMA8200v (ESX, KVM, Hyper-V, AWS, Azure), EX6000, EX7000, EX9000 

 

Note: SonicWall Firewall and SMA 100 (SMA200, 210, 400, 410, and 500v) products are not affected by this vulnerability. 

Please follow your organization’s patching and testing guidelines to minimize potential operational impact. 

Workaround 

  • Restrict access to trusted sources for the Appliance Management Console (AMC) and Central Management Console (CMC). 
  • Dual-homed appliances: Limit access to administrative consoles (default TCP port 8443) to trusted internal networks accessible via an internal interface only (will not impact user VPN traffic).  
  • Single-homed appliances: Use a firewall to limit access to administrative consoles (default TCP port 8443) to trusted internal networks (will not impact user VPN traffic).  

References 

Stay up to date with the latest security incidents and trends from Arctic Wolf Labs. 

Explore the latest global threats with the 2024 Arctic Wolf Labs Threats Report 

Resources

Understand the threat landscape, and how to better defend your organization, with the 2025 Arctic Wolf Threat Report

See how Arctic Wolf utilizes threat intelligence to harden your attack surface and stop threats earlier and faster

Share this post: