![]() ![]() It describes continuing to use its end-of-life products or 8.x firmware as “an active security risk” and at “imminent risk of a targeted ransomware attack”. This vulnerability has been patched in the later 9.x and 10.x firmware versions. In its report, SonicWall reports that ransomware attacks are being launched against these products using a known vulnerability in the 8.x firmware. Older Secure Remote Access (SRA) seriesĪ lifecycle table for these products can be found here.Because these versions have reached their end of life they are unpatched. The devices that the security notice mentions are running 8.x versions of the firmware. It sells a range of Internet appliances primarily directed at content control and network security, including devices providing services for network firewalls, unified threat management (UTM), virtual private networks (VPNs), and anti-spam for email. SonicWall is a company that specializes in securing networks. In addition to the notice posted to its website, SonicWall sent out an email to anyone using SMA and SRA devices, urging some to disconnect specific devices (see below under Mitigation) immediately. ![]() The exploitation targets a known vulnerability that has been patched in newer versions of SonicWall firmware. SonicWall has issued an urgent security notice warning users of unpatched End-Of-Life (EOL) SRA & SMA 8.X remote access devices that they have been made aware of an imminent ransomware campaign using stolen credentials. This post has been updated with a statement from SonicWall below ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |