Thursday, April 24, 2025
HomeCVE/vulnerabilitySonicWall Patches Multiple Vulnerabilities in NetExtender Windows Client

SonicWall Patches Multiple Vulnerabilities in NetExtender Windows Client

Published on

SIEM as a Service

Follow Us on Google News

SonicWall has issued a critical alert concerning multiple vulnerabilities discovered in its NetExtender Windows client.

These vulnerabilities, identified via several Common Vulnerabilities and Exposures (CVEs), could allow malicious actors to exploit privilege management flaws, trigger local privilege escalation, or manipulate file paths.

Users are urged to update their software immediately to mitigate potential risks.

- Advertisement - Google News

Overview of Vulnerabilities

CVE IDDescriptionCVSS ScoreCWE
CVE-2025-23008Improper privilege management vulnerability allowing low-privileged attackers to modify configuration settings.7.2CWE-250: Execution with Unnecessary Privileges
CVE-2025-23009Local privilege escalation vulnerability enabling arbitrary file deletion by attackers.5.9CWE-250: Execution with Unnecessary Privileges
CVE-2025-23010Improper link resolution vulnerability allowing manipulation of file paths before file access.6.5CWE-59: Improper Link Resolution Before File Access

Detailed Information

1. CVE-2025-23008

An improper privilege management vulnerability was identified in SonicWall NetExtender Windows clients (32-bit and 64-bit). This flaw permits low-privileged attackers to access and alter configurations, potentially compromising system security.

  • CVSS Score: 7.2
  • Impact: High (Confidentiality, Integrity, and Availability at risk)

2. CVE-2025-23009

This vulnerability allows attackers to perform local privilege escalation, triggering arbitrary file deletion in affected NetExtender versions. Exploitation requires local access and low complexity.

  • CVSS Score: 5.9
  • Impact: High (Integrity at risk)

3. CVE-2025-23010

An improper link resolution vulnerability enables attackers to manipulate file paths before access, potentially causing system disruption.

  • CVSS Score: 6.5
  • Impact: High (Availability at risk)

Affected Products

ProductVersion(s) AffectedFixed Version(s)
NetExtender Windows (32/64 bit)Version 10.3.1 and earlierVersion 10.3.2 and higher

SonicWall strongly advises users to upgrade their NetExtender Windows client to version 10.3.2 or higher to address these vulnerabilities. The company has confirmed that no evidence of exploitation in the wild has been observed.

To ensure the security of your systems, follow these steps:

  1. Download the latest patched version of SonicWall NetExtender from the official website.
  2. Implement regular patch management practices to prevent exploitation of known vulnerabilities.
  3. Monitor for unusual activity in your systems as a precautionary measure.

By acting promptly, users can mitigate risks and ensure their systems remain secure against these vulnerabilities.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Redis DoS Flaw Allows Attackers to Crash Servers or Drain Memory

A high-severity denial-of-service (DoS) vulnerability in Redis, tracked as CVE-2025-21605, allows unauthenticated attackers to crash...

Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google’s Mandiant team has released its M-Trends 2025 report, highlighting the increasing sophistication of...

Critical Langflow Flaw Enables Malicious Code Injection – Technical Breakdown Released

A critical remote code execution (RCE) vulnerability, identified as CVE-2025-3248 with a CVSS score...

GitLab Releases Critical Patch for XSS, DoS, and Account Takeover Bugs

GitLab, a leading DevOps platform, has released a critical security patch impacting both its...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Redis DoS Flaw Allows Attackers to Crash Servers or Drain Memory

A high-severity denial-of-service (DoS) vulnerability in Redis, tracked as CVE-2025-21605, allows unauthenticated attackers to crash...

Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google’s Mandiant team has released its M-Trends 2025 report, highlighting the increasing sophistication of...

Critical Langflow Flaw Enables Malicious Code Injection – Technical Breakdown Released

A critical remote code execution (RCE) vulnerability, identified as CVE-2025-3248 with a CVSS score...