Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

SonicWall Patches High-Severity Vulnerability in NetExtender

SonicWall has released fixes for three vulnerabilities in NetExtender for Windows, including a high-severity bug.

SonicWall hacked

SonicWall this week announced patches for three vulnerabilities in NetExtender for Windows, including a high-severity security bug.

A VPN client that relies on the SSL protocol for secure communication, NetExtender enables remote users to connect to an enterprise’s network and access resources the same as when connected from the local network.

Tracked as CVE-2025-23008 (CVSS score of 7.2), the high-severity flaw addressed in the latest release of the NetExtender Windows client is described as an improper privilege management bug that could be exploited by authenticated attackers to modify the application’s configuration.

The issue impacts both 32-bit and 64-bit iterations of the client and was addressed with the release of NetExtender Windows version 10.3.2.

The update also resolves two medium-severity vulnerabilities that could allow attackers to manipulate file paths (CVE-2025-23010) or trigger an arbitrary file deletion (CVE-2025-23009).

The company underlines that the NetExtender for Linux client is not affected by these security defects.

Advertisement. Scroll to continue reading.

“There is no evidence that these vulnerabilities are being exploited in the wild. SonicWall strongly advises users of the NetExtender Windows (32 and 64 bit) client to upgrade to the mentioned fixed release version to address these vulnerabilities,” SonicWall notes in its advisory.

Although the flaws do not appear to be exploited in the wild, it is not uncommon for threat actors to target vulnerabilities in SonicWall products.

In fact, two SonicWall bugs disclosed this year have been exploited in malicious attacks. A remote code execution issue in Secure Mobile Access, tracked as CVE-2025-23006, was exploited as a zero-day, and an authentication bypass in its firewalls, tracked as CVE-2024-53704, was exploited after proof-of-concept (PoC) code was published.

Related: SonicWall Patches 6 Vulnerabilities in Secure Access Gateway

Related: New VPN Attack Demonstrated Against Palo Alto Networks, SonicWall Products

Related: Critical SonicWall Vulnerability Possibly Exploited in Ransomware Attacks

Related: Recent SonicWall Firewall Vulnerability Potentially Exploited in the Wild

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Chris Sistrunk has been promoted to Practice Leader for Mandiant's OT Security Consulting.

Nudge Security has appointed Patrick Dillon as its Chief Revenue Officer.

AutoNation has appointed Brian Fricke as Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.