A significant security risk has been identified and is being actively exploited in certain SonicWall SSL VPN products. The issue was recently highlighted by cybersecurity news outlet The Hacker News, and SonicWall previously released an official security advisory confirming the threat.
Due to the critical nature of this risk and evidence of active exploitation, immediate action is required.
This post breaks down what you need to know and the steps you must take to protect your network.
According to reports, the threat actor is exploiting the SSL-VPN portal of SonicWall's Gen 7 firewalls. Threat actors are leveraging previously compromised credentials to breach networks. There is no confirmed account of an active undiscovered/undisclosed vulnerability or ‘zero day’.
SonicWall has published an official notice outlining the vulnerability and the necessary steps for mitigation. Based on their advisory (Source), the following actions are mandatory:
This vulnerability is not reproducible in SonicOS firmware version higher than 7.0.1-5035
Even after patching, SonicWall strongly recommends enabling MFA or consider disabling your SSL VPN in favor of another method for remote access such as CSE or the SMA 1000 product line. MFA provides a vital additional layer of security that can prevent unauthorized access even if credentials are compromised.
If you are unable to apply the patch immediately, you should restrict access to the SSL-VPN portal to only trusted sources. You can do this by creating a whitelist of specific IP addresses that are permitted to connect. While this reduces the attack surface, it is not a substitute for patching and should only be considered a temporary measure.
Our security team is already acting. We are actively auditing configurations, resetting credentials, and enforcing additional security best practices on SSLVPN. Logically managed firewall customers will have received all necessary patches for the previously disclosed vulnerability. We will notify you directly as this work is completed or if action is needed at the client’s end. So, please be on the lookout for tickets from Logically’s Cybersecurity Team.
We urge you to take the following steps without delay:
The security of your network is paramount. Do not delay in addressing this critical threat.
If you are unsure how to perform these updates or need assistance in securing your SonicWall device, please contact the Logically team. We are here to help you navigate this issue and ensure your organization remains protected.
Sources: