SonicWall & Apple Resolve Zero-Day Vulnerabilities Affecting Their Products

by | Feb 2, 2025

SonicWall and Apple released patches for critical zero-day vulnerabilities found in their products. Covered entities using these products need to update their HIPAA training to include the implementation of patches or updating the firmware of impacted devices.

Threat actors are taking advantage of the critical zero-day vulnerability CVE-2025-23006 identified in SonicWall Secure Mobile Access (SMA) 1000 series devices. SonicWall clients need to make sure they upgrade their software to the most recent patched version immediately to avoid exploitation of the vulnerability.

The CVE-2025-23006 vulnerability has an assigned CVSS severity score of 9.8. This is a pre-authentication remote code execution vulnerability that is found in the Central Management Console (CMC) and SMA1000 Appliance Management Console (AMC). The vulnerability is because of the deserialization of untrusted information. The vulnerability does not affect SMA 100 series products and SonicWall Firewall.

With particular conditions, an unauthenticated threat actor can take advantage of the vulnerability to implement arbitrary commands on the OS. Microsoft Threat Intelligence researchers discovered activity linked to vulnerability exploitation. The extent of exploiting the vulnerability in the wild is presently uncertain.

Cybercriminals are attracted to SonicWall appliances. A few ransomware groups have already exploited SonicWall vulnerabilities previously, thus a quick update is highly encouraged. The vulnerability impacts software versions 12.4.3-02804 and prior versions. Firmware version 12.4.3-02854 (platform-hotfix) and later versions are already fixed. About 2,400 SMA appliances are exposed online, but the number of vulnerable ones is uncertain.

Apple likewise released a patch to resolve a zero-day vulnerability in iOS that is actively exploited in the wild. Vulnerability CVE-2025-24085 is a use-after-free vulnerability impacting a CoreMedia part. The vulnerability can be exploited through a malicious program to change privileges. The vulnerability impacts iPads, iPhones, macs, TVs, Apple watches, and Vision Pro.

iPhone users of iOS versions before iOS 17.2 had been attacked though the degree of exploiting the vulnerability is not known. The vulnerability has been resolved throughout all products, and users must update to these fixed versions: iPadOS 18.3, iOS 18.3, tvOS 18.3, macOS Sequoia 15.3, watchOS 11.3, and visionOS 2.3.

Raise the level of HIPAA Awareness in your organization with Learner-Friendly, Comprehensive and Affordable HIPAA Training.

COMPREHENSIVE HIPAA TRAINING

Please enable JavaScript in your browser to complete this form.

Ryan Coyne

Ryan Coyne is a results-driven leader in the healthcare compliance industry, specializing in regulatory compliance, compliance training, and assisting healthcare organizations and business associates in achieving and maintaining compliance. With a deep knowledge of healthcare regulations and a keen understanding of the challenges faced by the industry, Ryan has developed a reputation as a trusted advisor and advocate for ethical and compliant practices in healthcare. Ryan has successfully advised and guided numerous healthcare organizations, business associates, and healthcare professionals on achieving and maintaining compliance with regulatory training requirements. Ryan's professional focus is using his in-depth expertise and leading a world class team of subject matter experts at ComplianceJunction in regulatory compliance to help organisations navigate the complex landscape of ensuring staff adhere to healthcare regulations. You can connect with Ryan via LinkedIn and follow on Twitter

Raise the level of HIPAA Awareness in your organization with Learner-Friendly, Comprehensive and Affordable HIPAA Training.

Comprehensive HIPAA Training

Used in 1000+ Healthcare Organizations and 100+ Universities

    Full Course - Immediate Access

    Privacy Policy