SonicWall VPN Zero-Day Vulnerability Actively Exploited, Over 20 Targeted Attacks Reported

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

A critical SonicWall VPN vulnerability is being actively exploited in the wild, prompting the network security vendor to issue an urgent cybersecurity advisory. Threat actors are leveraging a zero-day exploit to bypass multi-factor authentication (MFA) and deploy ransomware within hours of initial compromise, including Akira.  

Attack Details  

The exploit targets SonicWall’s seventh-generation firewall appliances running firmware version 7.2.0-7015 or earlier. Attackers gain initial access by breaching the VPN appliance itself, followed by rapid post-exploitation activities, the advisory said.

Post-exploitation techniques are linked to enumeration, detection evasion, lateral movement, and credential theft and vary based on the incident, a Huntress report said, adding that the attacks may be limited to TZ and NSa-series devices.

Timeline of attacks visualization
Timeline of attacks visualization | Source: Huntress

Arctic Wolf observed a July 2025 uptick in Akira Ransomware activity targeting SonicWall SSL VPN. Huntress also published an advisory on the same matter, saying it detected around 20 different attacks starting on July 25, 2025.

Key tactics identified include:

Cybersecurity Implications  

This vulnerability poses a severe risk to organizations relying on SonicWall VPNs, as adversaries can escalate privileges, evade detection, and deliver high-impact payloads such as ransomware. Compromises of this nature can significantly disrupt business operations and result in substantial data breaches.  

Huntress advises organizations to address this zero-day exploit immediately by taking the following steps:

In February, TechNadu reported on SonicWall SSL VPN sessions being exposed to hijacking due to a critical vulnerability.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: