SonicWall & Apple Issue Patches for Actively Exploited Zero-Days

Hackers are exploiting a critical zero-day vulnerability in SonicWall Secure Mobile Access (SMA) 1000 series appliances. SonicWall customers should ensure they update their firmware to the latest patched version as soon as possible to prevent exploitation of the flaw.The vulnerability is tracked as CVE-2025-23006 and has a CVSS severity score of 9.8 out of 10. The pre-authentication remote code execution vulnerability is in the SMA1000 Appliance Management Console (AMC) -& Central Management Console (CMC). The vulnerability is due to the deserialization of untrusted data. The SonicWall Firewall and SMA 100 series products are not affected by the vulnerability.Under certain conditions, an unauthenticated attacker can exploit the vulnerability to execute arbitrary commands on the operating system. Researchers at Microsoft Threat Intelligence identified activity associated with the exploitation of the flaw. It is currently unclear to what extent the flaw is being exploited in the wild.SonicWall appliances are attractive targets for cybercriminals, and several ransomware groups have targeted SonicWall vulnerabilities in the past, so an immediate update is strongly recommended. The vulnerability affects firmware versions 12.4.3-02804 and earlier and has been fixed in firmware version 12.4.3-02854 (platform-hotfix) and higher versions. Almost 2,400 SMA appliances are exposed to the Internet, although it is unclear how many of those are currently vulnerable.Apple Patches First Actively Exploited iOS Zero-Day of 2025———————————————————–Apple has also issued an update to fix a zero-day vulnerability in iOS that is being actively exploited in the wild. The vulnerability is tracked as CVE-2025-24085 and is a use-after-free flaw affecting a CoreMedia component. The flaw could be exploited by a malicious application to elevate privileges. The vulnerability affects iPhones, iPads, macs, TVs, Vision Pro, and Apple watches.Apple has detected attacks on iPhone users (iOS versions before iOS 17.2) although the extent to which the flaw is being exploited is unknown. The flaw has been fixed across all products, and users should update to the following fixed versions: iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, tvOS 18.3, visionOS 2.3, and watchOS 11.3.The post [SonicWall -& Apple Issue Patches for Actively Exploited Zero-Days](https://www.hipaajournal.com/sonicwall-apple-issue-patches-for-actively-exploited-zero-days/) appeared first on [The HIPAA Journal](https://www.hipaajournal.com).

Related Tags:
CVE-2025-23006

NAICS: 334 – Computer And Electronic Product Manufacturing

NAICS: 62 – Health Care And Social Assistance

NAICS: 518 – Computing Infrastructure Providers

Data Processing

Web Hosting

Related Services

NAICS: 33 – Manufacturing – Metal

Electronics And Other

NAICS: 51 – Information

Blog: Hipaa Journal

Exploitation for Client Execution

Exploit Public-Facing Application

Associated Indicators: