Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

SonicWall Patches High-Severity Vulnerability in NetExtender

SonicWall has released fixes for three vulnerabilities in NetExtender for Windows, including a high-severity bug.

SonicWall vulnerability exploited

SonicWall this week announced patches for three vulnerabilities in NetExtender for Windows, including a high-severity security bug.

A VPN client that relies on the SSL protocol for secure communication, NetExtender enables remote users to connect to an enterprise’s network and access resources the same as when connected from the local network.

Tracked as CVE-2025-23008 (CVSS score of 7.2), the high-severity flaw addressed in the latest release of the NetExtender Windows client is described as an improper privilege management bug that could be exploited by authenticated attackers to modify the application’s configuration.

The issue impacts both 32-bit and 64-bit iterations of the client and was addressed with the release of NetExtender Windows version 10.3.2.

The update also resolves two medium-severity vulnerabilities that could allow attackers to manipulate file paths (CVE-2025-23010) or trigger an arbitrary file deletion (CVE-2025-23009).

The company underlines that the NetExtender for Linux client is not affected by these security defects.

“There is no evidence that these vulnerabilities are being exploited in the wild. SonicWall strongly advises users of the NetExtender Windows (32 and 64 bit) client to upgrade to the mentioned fixed release version to address these vulnerabilities,” SonicWall notes in its advisory.

Although the flaws do not appear to be exploited in the wild, it is not uncommon for threat actors to target vulnerabilities in SonicWall products.

Advertisement. Scroll to continue reading.

In fact, two SonicWall bugs disclosed this year have been exploited in malicious attacks. A remote code execution issue in Secure Mobile Access, tracked as CVE-2025-23006, was exploited as a zero-day, and an authentication bypass in its firewalls, tracked as CVE-2024-53704, was exploited after proof-of-concept (PoC) code was published.

Related: SonicWall Patches 6 Vulnerabilities in Secure Access Gateway

Related: New VPN Attack Demonstrated Against Palo Alto Networks, SonicWall Products

Related: Critical SonicWall Vulnerability Possibly Exploited in Ransomware Attacks

Related: Recent SonicWall Firewall Vulnerability Potentially Exploited in the Wild

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Wendi Whitmore has taken the role of Chief Security Intelligence Officer at Palo Alto Networks.

Phil Venables, former CISO of Google Cloud, has joined Ballistic Ventures as a Venture Partner.

David Currie, former CISO of Nubank and Klarna, has been appointed CEO of Vaultree.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.