Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

A critical authentication bypass vulnerability in SonicWall Gen6 SSL-VPN appliances is actively exploited, allowing attackers to log in without a second authentication factor even on patched devices where a required LDAP reconfiguration step was not completed. Confirmed active exploitation between February and March 2026 targets organizations across multiple sectors, with attack patterns consistent with initial access brokers positioning for ransomware deployment. Organizations running Gen6 appliances face an elevated and compounding risk: the firmware patch alone does not close the attack surface, and incomplete remediation is difficult to detect through standard log review.

Author

Tech Jacks Solutions