The Hidden Risks of Firewalls, VPNs, and Network Gateways—and What You Should Be Doing Instead
The Problem: Security Vulnerabilities in Network Appliances
Recent security flaws in SonicWall, Ivanti, and Fortigate appliances have once again highlighted a recurring issue—critical vulnerabilities being discovered in widely used firewalls, VPN gateways, and network security devices. These vendors are not alone; major players like Cisco and others have also suffered from the same fundamental problem.
The reality is this: any device exposed directly to the internet is a ticking time bomb
Simply put, the traditional ‘put a box on the edge of your network and hope for the best’ approach is no longer viable in today’s cyber threat landscape.
Real World Examples
Recent incidents have highlighted the significant risks associated with exposing network appliances directly to the internet. Notably, vulnerabilities in products from SonicWall, Ivanti, and Fortinet have been actively exploited by threat actors, leading to substantial security breaches.
SonicWall Vulnerabilities
In January 2025, a critical deserialization vulnerability (CVE-2025-23006) was identified in SonicWall’s SMA1000 series appliances. This flaw allowed remote, unauthenticated attackers to execute arbitrary OS commands, posing a severe risk to organisations utilising these devices.
Ivanti Breaches
Ivanti’s Pulse Connect Secure VPN devices have been a focal point of security concerns. In 2021, suspected state-sponsored actors exploited zero-day vulnerabilities in these devices, compromising multiple government agencies and financial institutions across the U.S. and Europe. The breaches persisted for months before detection, underscoring the dangers of unpatched, internet-facing appliances.
Fortinet Exploits
Fortinet has also faced challenges with vulnerabilities in its products. For instance, a critical authentication bypass vulnerability (CVE-2024-55591) was discovered in FortiOS and FortiProxy, which could allow unauthenticated attackers to gain super-admin privileges via crafted requests. Such vulnerabilities have been added to the CISA Known Exploited Vulnerabilities Catalog, emphasising their severity.
The Broader Implication
These incidents are not isolated. A detailed report by Sophos revealed a prolonged battle with Chinese hackers who persistently targeted firewall devices over five years. The adversaries exploited security flaws to gain access to Sophos and its customers’ systems, highlighting the broader issue of security devices themselves being vulnerable entry points for cyber attacks.
A Smarter Approach: Zero Trust & Reverse Proxies
Instead of exposing services directly to the internet, modern businesses should be adopting Zero Trust architectures and outbound-only proxies. Here’s how:
A Modern SME Should Plan for a Secure Future
If your business is still exposing services directly to the internet, it’s time to rethink your approach. The best way to dramatically reduce cyber risk is to eliminate attack surfaces rather than trying to patch them endlessly.
At Aegis Secure Technologies, we help businesses transition to Zero Trust security models and outbound-only architectures, keeping your organisation secure, efficient, and one step ahead of cyber threats.