SonicWall and Apple released patches for critical zero-day vulnerabilities found in their products. Covered entities using these products need to update their HIPAA training to include the implementation of patches or updating the firmware of impacted devices.
Threat actors are taking advantage of the critical zero-day vulnerability CVE-2025-23006 identified in SonicWall Secure Mobile Access (SMA) 1000 series devices. SonicWall clients need to make sure they upgrade their software to the most recent patched version immediately to avoid exploitation of the vulnerability.
The CVE-2025-23006 vulnerability has an assigned CVSS severity score of 9.8. This is a pre-authentication remote code execution vulnerability that is found in the Central Management Console (CMC) and SMA1000 Appliance Management Console (AMC). The vulnerability is because of the deserialization of untrusted information. The vulnerability does not affect SMA 100 series products and SonicWall Firewall.
With particular conditions, an unauthenticated threat actor can take advantage of the vulnerability to implement arbitrary commands on the OS. Microsoft Threat Intelligence researchers discovered activity linked to vulnerability exploitation. The extent of exploiting the vulnerability in the wild is presently uncertain.
Cybercriminals are attracted to SonicWall appliances. A few ransomware groups have already exploited SonicWall vulnerabilities previously, thus a quick update is highly encouraged. The vulnerability impacts software versions 12.4.3-02804 and prior versions. Firmware version 12.4.3-02854 (platform-hotfix) and later versions are already fixed. About 2,400 SMA appliances are exposed online, but the number of vulnerable ones is uncertain.
Apple likewise released a patch to resolve a zero-day vulnerability in iOS that is actively exploited in the wild. Vulnerability CVE-2025-24085 is a use-after-free vulnerability impacting a CoreMedia part. The vulnerability can be exploited through a malicious program to change privileges. The vulnerability impacts iPads, iPhones, macs, TVs, Apple watches, and Vision Pro.
iPhone users of iOS versions before iOS 17.2 had been attacked though the degree of exploiting the vulnerability is not known. The vulnerability has been resolved throughout all products, and users must update to these fixed versions: iPadOS 18.3, iOS 18.3, tvOS 18.3, macOS Sequoia 15.3, watchOS 11.3, and visionOS 2.3.