Vulnerability Found in Microsoft Exchange Server
A remote code execution vulnerability exists in Microsoft Exchange Server when the server fails to properly create unique keys at install time. ...
24/7/365 Monitoring & Alerting
Compromise Assessments
Threat Hunting
Vulnerability Management
CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support
If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.
Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.
At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.
2 min read
Daniel Guidry : Jun 16, 2021 12:00:00 AM
A buffer overflow vulnerability in SonicOS could allow a remote attacker to cause a Denial of Service (DoS) by sending a specially crafted request to the firewall’s web interface. This vulnerability affects SonicOS Gen5, Gen6, Gen7 platforms, and SonicOSv virtual firewalls.
This advisory specifically applies to the following SonicWall products:
Platforms |
SonicOS Running Version |
TZ, NS a (GEN7) |
7.0.1-R1262 and older |
NS v (Virtual GEN7) |
7.0.1-R1219 and older |
NS sp (GEN7) |
7.0.1-R514 and older |
NS a, TZ, SOHO W, SuperMassive 92xx/94xx/96xx (GEN6+) |
6.5.4.7 and older |
NS sp 12K, SuperMassive 9800 |
6.5.1.12 and older |
SuperMassive 10K |
6.0.5.3-94o and older |
NS v (Virtual: VMWare/Hyper-V/AWS/Azure/KVM) |
All versions (virtual) |
NSA, TZ, SOHO (GEN5) |
5.9.1.13 and older |
CVE-2021-20027
Buffer overflow vulnerability
Not known to be exploited in the wild yet
CVSS Score of 7.5/10 (High)
The vulnerability requires Web Management to be enabled on the WAN/LAN interface and for there to be an ongoing active management session. This scenario can exist 1) if an administrator is logged into the web interface or 2) if Global Management System (GMS) / Network Security Manager (NSM) are configured to manage the firewall over HTTPS on the WAN interface.
If WAN management is disabled on the firewall the GMS/NSM management modes listed below are not impacted:
The SSL-VPN portal on the firewall, Virtual Office, is NOT affected.
Ingalls strongly recommends that affected clients apply the SonicOS Firmware updates ASAP. If this is not possible, Ingalls recommends following SonicWall’s recommendation that administrators limit SonicOS management access to trusted sources (and/or disable management access from untrusted internet sources) by modifying the existing SonicOS Management access rules (SSH/HTTPS/HTTP Management). This will only allow management access from trusted source IP addresses.
Updating SonicOS Firmware (Recommended)
FIXED SOFTWARE:
Platforms: NSa, TZ, NSsp (GEN7) |
|
SonicOS Running Version |
SonicOS Patch Release (Update to version or later) |
NSa,TZ- 7.0.1-R1262 and older |
7.0.1-R1456 |
NSsp- 7.0.1-R514 and older |
7.0.1-R579 |
Platforms: NSv (Virtual: GEN7) |
|
SonicOS Running Version |
SonicOS Patch Release (Update to version or later) |
7.0.1-R1219 and older |
7.0.1-R1282/1283 |
Platforms: NSa, TZ, SOHO W, SuperMassive 92xx/94xx/96xx (GEN6+) |
|
SonicOS Running Version |
SonicOS Patch Release (Update to version or later) |
6.5.4.7 and older |
6.5.4.8-89n |
Platforms: NSsp 12K, SuperMassive 9800 |
|
SonicOS Running Version |
SonicOS Patch Release (Update to version or later) |
6.5.1.12-1n and older |
6.5.1.12-3n |
Platforms: SuperMassive 10k |
|
SonicOS Running Version |
SonicOS Patch Release (Update to version or later) |
6.0.5.3-94o and older |
Pending Release |
Platforms: NSv (Virtual: VMWare/Hyper-V/AWS/Azure/KVM) |
|
SonicOS Running Version |
SonicOS Patch Release (Update to version or later) |
All versions (virtual) |
6.5.4.v_21s-1288 |
Platforms: NSA, TZ, SOHO (GEN5): |
|
SonicOS Running Version |
SonicOS Patch Release (Update to version or later) |
5.9.1.13 and older |
Pending Release |
A remote code execution vulnerability exists in Microsoft Exchange Server when the server fails to properly create unique keys at install time. ...
This security advisory notice addresses the critical unauthenticated remote code execution vulnerability in FortisOS: CVE-2022-42475. Read on to...
On July 14, 2020, Microsoft released a security update for the issue described in CVE-2020-1350 | Windows DNS Server Remote Code Execution...