Frequently Asked Questions About SonicWall Gen 7 Firewall Ransomware Activity

An increase in ransomware activity tied to SonicWall Gen 7 Firewalls has been observed, possibly linked to the exploitation of a zero-day vulnerability in its SSL VPN.
Background
Tenable’s Research Special Operations (RSO) team has compiled this blog to answer Frequently Asked Questions (FAQ) regarding an increase in ransomware activity targeting SonicWall Gen 7 Firewalls.
FAQ
What is the ransomware activity being observed against SonicWall Gen 7 Firewalls?
Reports from researchers at Arctic Wolf and Huntress have noted an observable increase in attacks targeting SonicWall firewalls, specifically the Gen 7 (or seventh generation) firewalls. Both Arctic Wolf and Huntress assess that the ransomware activity is linked to the Akira ransomware.
When was this ransomware activity against SonicWall firewalls first observed?
Arctic Wolf observed an increase in activity at the end of July 2025, while Huntress has been responding to incidents in the first few days of August 2025.
What does this have to do with SonicWall’s SSL VPN and a zero-day vulnerability?
The ransomware activity has been observed on Gen 7 firewalls with SSL VPN enabled.
Researchers have noted that even if multifactor authentication is enabled, attackers have been able to compromise accounts on these devices. In some instances, the SonicWall devices are fully patched. These factors give credence to the likelihood that a zero-day vulnerability in these devices is being exploited.
What are the vulnerabilities associated with this ransomware activity?
As of August 5, SonicWall has not yet assigned any CVEs for the ransomware activity. However, we will update this blog if and when a CVE is assigned.
Are there any other threat actors involved in this ransomware activity?
Right now, we are only aware of reports that the Akira ransomware has been leveraged in these attacks. We will update this blog post if or when additional ransomware activity, along with any other malicious activity, is observed.
Are patches or mitigations available for this ransomware activity?
SonicWall has published a threat activity notice on its website as it investigates the reports of malicious activity, but has not yet provided any patch details as of August 5. However, they have instructed customers using SonicWall Gen 7 firewalls to disable SSLVPN services “where practical.” If disabling SSLVPN services is not viable, SonicWall has provided the following mitigation instructions:
- Use an allow-list of trusted source IP addresses for accessing the SSLVPN
- Activate Botnet Protection and Geo-IP filtering
- Enforce multifactor authentication (MFA) for SSLVPN
- Audit accounts and identify unused or inactive accounts
- Use strong and unique passwords for user accounts
I thought that MFA was bypassed by the attackers, so why is that listed as a mitigation?
MFA is part of standard security guidance to thwart against common attack vectors, e.g. brute-force, credential stuffing or stolen credentials.
Has Tenable released any product coverage?
Since no CVE has been assigned as of August 5, Tenable does not have any coverage. However, if and when a CVE is assigned, we will update this blog with coverage details.
Until then, customers can utilize our SonicWall SonicOS detection plugin to identify Gen 7 devices on their networks.
Additionally, Tenable Attack Surface Management customers can identify external-facing SonicWall assets with SSL VPN enabled by leveraging the built-in subscription labeled SonicWall SSL-VPN v1.

Get more information
- Gen 7 SonicWall Firewalls – SSLVPN Recent Threat Activity
- Arctic Wolf Observes July 2025 Uptick in Akira Ransomware Activity Targeting SonicWall SSL VPN
- Huntress Threat Advisory: Active Exploitation of SonicWall VPNs
Join Tenable's Research Special Operations (RSO) Team on the Tenable Community.
Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.
- Exposure Management
- Vulnerability Management
- Exposure Management
- Vulnerability Management