The latest security hole affecting
SonicWall's SMA1000 remote access equipment has resulted in an urgent warning from
SonicWall. This particular hole has already been utilized in live operational circumstances by hackers, and presents a much more serious problem than your standard bug fix advisory.
The problem is labelled
zero-day, referring to the fact that
SonyWall became aware of the issue only after it had already been taken advantage of by an assailant. This defect will give hackers enhanced systems authority by enabling them to convert limited access to full administrative rights.
Why is this defect such a significant risk?
There are many businesses that utilize
SMA1000 devices for safe remote access and
Virtual Private Networks (VPNs). By seizing control of these devices, attackers will have the ability to monitor internet traffic. They can steal all your information and/or potentially prevent you from operating your business.
The Zero Day Network Attackers Are Exploiting Multiple Vulnerabilities
Attackers have taken things to another level with their exploits and find multiple ways to invade networks. Attackers have taken this zero-day exploit and combined it with other vulnerabilities that are already known, and not yet patched. When an attacker gains access to a system, they do so without having to log in, and have full control of all the devices.
What should you be doing to address this threat?
If you have an
SMA1000 appliance, NOW is the time to be proactive:
- Apply SonicWall's most recent security updates NOW
- Restrict Access to the Admin Interface
- NEVER expose Management Panels to the Internet
Conclusion and Takeaway
This is NOT a theoretical threat that could happen in the future, but a very real, latest problem for many organizations. By delaying an update to correct the problem, you are allowing the attacker time to compromise your network. Address this issue ASAP to secure your network from future attacks.