1 min read

Critical Alert: Zero-Day Vulnerability in SonicWall VPNs Actively Exploited

Critical Alert: Zero-Day Vulnerability in SonicWall VPNs Actively Exploited
A severe zero-day vulnerability in SonicWall VPNs is currently being exploited in the wild, posing a significant threat to organizations. Attackers are leveraging this flaw to bypass multi-factor authentication (MFA) and deploy ransomware, compromising network security.
 
This is an ongoing, high-priority issue that demands immediate attention.
 
Attack Details: The vulnerability primarily affects SonicWall seventh-generation firewalls. Attackers are using tools such as Advanced IP Scanner, WinRAR, and FileZilla to gain initial access. Once inside, they establish persistence by creating new user accounts or installing remote access tools, enabling further exploitation and ransomware deployment.
 
Over 20 high-severity incidents have been reported, underscoring the scale and urgency of this threat. Recommended actions to protect your environment, take the following steps immediately:
  1. Disable SonicWall VPN Access: As a precautionary measure, disable SSL VPN access on all SonicWall appliances until an official patch is released. Alternatively, restrict VPN access to specific, trusted IP addresses to minimize exposure.
  2. Contact SonicWall Support: If you suspect or confirm a compromise, open a support case with SonicWall. This helps their team track the vulnerability and provide targeted assistance.
  3. Monitor for Indicators of Compromise (IOCs): Refer to detailed threat advisories for up-to-date IOCs and additional mitigation steps. These resources provide critical insights into the vulnerability and attacker tactics.
  4. Identify Affected Devices: Use external reconnaissance tools to scan your environment for SonicWall devices. Filtering for port 4433, the default port for SonicWall VPNs, can help pinpoint vulnerable appliances.
Stay Proactive. This zero-day exploit is a stark reminder of the evolving threat landscape. Regularly monitor your network for suspicious activity, keep your systems updated, and consult trusted resources for the latest threat intelligence.
 
If you have questions or need guidance, reach out to us at cyber@veroot.com or SonicWall support for assistance.  Stay vigilant and act swiftly to secure your environment against this critical threat.

Related posts you may be interested in reading:

Russian Hacker Group ‘Star Blizzard’ Upgrades Phishing Stealth, Research Uncovers

Russian Hacker Group ‘Star Blizzard’ Upgrades Phishing Stealth, Research Uncovers

State Sponsored Villains “Star Blizzard” (aka Seaborgium, BlueCharlie, Callisto Group, Coldriver) has been actively involved in cyber espionage since...

Read More
Ensuring the Cybersecurity of Electronic Logging Devices: A Call to Action from Colorado State University Researchers

Ensuring the Cybersecurity of Electronic Logging Devices: A Call to Action from Colorado State University Researchers

In a recent study conducted by researchers from Colorado State University, Electronic Logging Devices (ELDs) have been identified as significant...

Read More
Unmasking VEILDrive: How Threat Actors Are Exploiting Microsoft SaaS to Spread Malware

Unmasking VEILDrive: How Threat Actors Are Exploiting Microsoft SaaS to Spread Malware

Unmasking VEILDrive: How Threat Actors Are Exploiting Microsoft SaaS to Spread Malware**A sophisticated cyber threat campaign known as "VEILDrive"...

Read More