Categories: US-Cert-Repository

Ransomware Risk in Unpatched, EOL SonicWall SRA and SMA 8.x Products



Original release date: July 15, 2021

CISA is aware of threat actors actively targeting a known, previously patched, vulnerability in SonicWall Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products running unpatched and end-of-life (EOL) 8.x firmware. Threat actors can exploit this vulnerability to initiate a targeted ransomware attack.

CISA encourages users and administrators to review the SonicWall security advisory and upgrade to the newest firmware or disconnect EOL appliances as soon as possible. Review the CISA Bad Practices webpage to learn more about bad cybersecurity practices, such as using EOL software, that are especially dangerous for organizations supporting designated Critical Infrastructure or National Critical Functions. 

This product is provided subject to this Notification and this Privacy & Use policy.



Source link

admin

Share
Published by
admin

Recent Posts

Continuing Threats to Home Users

Systems Affected   Continuing Threats to Home Users View Previous Alerts Alert (SA04-079A) Continuing Threats…

13 hours ago

Cross-Domain Vulnerability in Outlook Express MHTML Protocol Handler

Systems Affected   Microsoft Windows systems   Overview   A cross-domain vulnerability in the Outlook…

2 days ago

Summary of Windows Security Updates for April 2004

Systems Affected   Systems running Microsoft Windows   Overview   There are multiple vulnerabilities in…

3 days ago

Multiple Vulnerabilities in Microsoft Products

Systems Affected   Microsoft Windows Operating Systems Microsoft Windows Remote Procedure Call (RPC) and Distributed…

4 days ago

Cisco IOS SNMP Message Handling Vulnerability

Systems Affected Cisco routers and switches running vulnerable versions of IOS. Vulnerable IOS versions known…

5 days ago

Vulnerabilities in TCP

Systems Affected Systems that rely on persistent TCP connections, for example routers supporting BGP Overview…

6 days ago

This website uses cookies.