• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Sonicwall Vulnerability Set, But Scientists Say The Patch Took 17

SonicWall issues firmware patch after attackers exploited critical bugs

You are here: Home / General Cyber Security News / SonicWall issues firmware patch after attackers exploited critical bugs

SonicWall designed available a critical patch for two vulnerabilities in its Safe Mobile Access 100 series goods featuring 10.x firmware. (SonicWall)

SonicWall right now made accessible a critical patch for two vulnerabilities in its Safe Cellular Access 100 collection items that includes 10.x firmware, which malicious actors exploited in a cyberattack from the infosec business past month. 

Times following SonicWall disclosed the incident on Jan. 22, scientists with the NCC Group on Jan. 31 and Feb. 2 verified the existence of the two bugs, enabling the enhancement of a resolve. A single flaw is made up of an exploit that enables admin credential accessibility, and the other is a distant code execution attack.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Acronis True Image 2021

Protect and backup your data using Acronis True Image. Acronis is made in Germany and is a leading brand in IT back up and secirity for years. Acronis True Image take secure and enxrypted backups from your Wdindows and macOS. With Acronis True image you will never be worried about Ransomware attacks and virus infections.

Get Acronis with 50% discount from our partner: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


A SonicWall security advisory describes a person vulnerability – designated CVE-2021-20016 and granted a CVSS score of 9.8 – as a SQL injection bug “in the SonicWall SSLVPN SMA100 item that makes it possible for a remote unauthenticated attacker to carry out SQL question to obtain username password and other session-linked facts.”

SonicWall’s firmware update to version 10.2..5-29sv repairs the impacted merchandise, which are outlined as the SMA 200, SMA 210, SMA 400 and SMA 410 appliances and the SMA 500v virtual appliance (for Azure, AWS, ESXi, and HyperV). SonicWall claimed that at this time it is “not mindful of any forensic data that can be considered by the person to determine no matter if a device has been attacked.”

These who do improve the firmware are recommended to “reset the passwords for any people who may have logged in to the unit via the web interface” as nicely as permit multi-factor authentication. People not able to install the patch at this time can use a non permanent mitigation procedure by enabling their devices’ crafted-in web application firewall (WAF) attribute.

SonicWall also famous that it pulled vulnerable virtual SMA 100 collection 10.x illustrations or photos from AWS and Azure marketplaces. Up to date images will be re-submitted as quickly as doable, the organization mentioned.


Some elements of this article are sourced from:
www.scmagazine.com

Previous Post: «Emotet’s Takedown: Have We Seen The Last Of The Malware? Emotet’s Takedown: Have We Seen the Last of the Malware?

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • SonicWall issues firmware patch after attackers exploited critical bugs
  • Emotet’s Takedown: Have We Seen the Last of the Malware?
  • Second SolarWinds Attack Group Breaks into USDA Payroll — Report
  • New Malware Hijacks Kubernetes Clusters to Mine Monero
  • Fertility App Sued Over Non-Consensual Data Sharing
  • Execs fear business setbacks from failure to keep up with ‘digital born’ competitors
  • Prison for International Credit Card Fraud Kingpin
  • Tulsa Mayor’s Cyber-stalker Jailed
  • HelpSystems Expands Cybersecurity Portfolio Through Latest Acquisition
  • How to run Chkdsk

Copyright © TheCyberSecurity.News, All Rights Reserved.