Hackers attempt to exploit SonicWall zero-day vulnerability
The flaw is believed to be the same vulnerability used in a security incident confirmed by the company late last month
The flaw is believed to be the same zero-day vulnerability used in a security incident confirmed by the company late last month.
Researchers from IT security company NCC Group said that they had notified SonicWall of the flaw as well as the exploits over the weekend. In a Twitter post, the researchers said they had “identified and demonstrated exploitability of a possible candidate for the vulnerability described and sent details to SonicWall”.
“We've also seen indication of indiscriminate use of an exploit in the wild,” the post stated.
NCC Group CTO Ollie Whitehouse said that the company had received confirmation from SonicWall that it had received the security company's warnings about the flaw.
IT Pro contacted the NCC Group for more information. However, according to ZDNet, the researchers have decided not to share details about the nature of the zero-day vulnerability in order to prevent other threat actors from collecting enough information to launch further attacks.
On 23 January, SonicWall announced that it had “identified a coordinated attack on its internal systems by highly sophisticated threat actors exploiting probable zero-day vulnerabilities on certain SonicWall secure remote access products”.
Channel Pro Insight: A fast guide to central network management
How to stay connected and secure with central network managementDownload now
The company didn’t specify when exactly the incident took place but ruled out that its NetExtender VPN Client product had been compromised, adding that the only products to remain under investigation are from the SMA 100 series. However, SonicWall clarified that, despite the investigation, all “SMA 100 series products may be used safely in common deployment use cases”.
On Friday, the company issued an update saying that it’s continuing its investigation into the SMA 100 Series, although “the presence of a potential zero-day vulnerability remains unconfirmed”.
SonicWall also stated that it had analysed a number of reports from its clients of “potentially compromised SMA 100 series devices”, adding that it had “so far only observed the use of previously stolen credentials to log into the SMA devices”.
“We will continue to fully investigate this matter and share more information and guidance as we have it. We will post further updates on this KB and will hopefully soon rule definitively on the outcome of this investigation,” it said.
How virtual desktop infrastructure enables digital transformation
Challenges and benefits of VDIFree download
The Okta digital trust index
Exploring the human edge of trustFree download
Optimising workload placement in your hybrid cloud
Deliver increased IT agility with the cloudFree Download
Modernise endpoint protection and leave your legacy challenges behind
The risk of keeping your legacy endpoint security toolsDownload now