• Hello and welcome! Register to enjoy full access and benefits:

    • Advertise in the Marketplace section for free.
    • Get more visibility with a signature link.
    • Company/website listings.
    • Ask & answer queries.
    • Much more...

    Register here or log in if you're already a member.

  • 🎉 WHV has crossed 72000 (72k) monthly views (unique) and 272000 clicks per month, as per Google Analytics! Thank you for your support! 🎉

SonicWall Warns of New SMA1000 Zero-Day Actively Exploited in Attacks

johny899

Member
Content Writer
Messages
1,069
Reaction score
3
Points
43
Balance
$122.4USD
The latest security hole affecting SonicWall's SMA1000 remote access equipment has resulted in an urgent warning from SonicWall. This particular hole has already been utilized in live operational circumstances by hackers, and presents a much more serious problem than your standard bug fix advisory.

The problem is labelled zero-day, referring to the fact that SonyWall became aware of the issue only after it had already been taken advantage of by an assailant. This defect will give hackers enhanced systems authority by enabling them to convert limited access to full administrative rights.

Why is this defect such a significant risk?​

There are many businesses that utilize SMA1000 devices for safe remote access and Virtual Private Networks (VPNs). By seizing control of these devices, attackers will have the ability to monitor internet traffic. They can steal all your information and/or potentially prevent you from operating your business.

The Zero Day Network Attackers Are Exploiting Multiple Vulnerabilities​

Attackers have taken things to another level with their exploits and find multiple ways to invade networks. Attackers have taken this zero-day exploit and combined it with other vulnerabilities that are already known, and not yet patched. When an attacker gains access to a system, they do so without having to log in, and have full control of all the devices.

What should you be doing to address this threat?​

If you have an SMA1000 appliance, NOW is the time to be proactive:
  • Apply SonicWall's most recent security updates NOW
  • Restrict Access to the Admin Interface
  • NEVER expose Management Panels to the Internet

Conclusion and Takeaway​

This is NOT a theoretical threat that could happen in the future, but a very real, latest problem for many organizations. By delaying an update to correct the problem, you are allowing the attacker time to compromise your network. Address this issue ASAP to secure your network from future attacks.
 
Top