comparemela.com


In a statement published Jan. 22, SonicWall officials wrote they detected an attack "by highly sophisticated threat actors exploiting probably zero-day vulnerabilities on certain SonicWall secure remote access products." 
As of Jan. 23, the company has confirmed its SonicWall Firewalls, NetExtender VPN Client, Secure Mobile Access (SMA) 1000 Series, and SonicWave Access Points were not affected in the recent attack. The SMA 100 Series, used to provide employees with remote access to internal resources, is under investigation but "may be used safely in common deployment use cases." 
Current SMA 100 series users may continue to use NetExtender for remote access, a use case the company has determined is not susceptible to exploitation. Admins for the SMA 100 series are advised to create specific access rules while investigation of the vulnerability is underway. SonicWall suggests using a firewall to allow only SSL-VPN connections to the SMA from known IP addresses, or to configure whitelist access on the SMA itself. The company also urges implementing multifactor authentication on all SonicWall SMA, Firewall, and MySonicWall accounts. 

Related Keywords

Brandon Hoffman ,Tim Wade ,Allie Mellen ,Kelly Sheridan ,Tanner Johnson ,Insurance Technology ,Party Risk ,Microsoft ,Sonicwall Is Latest Security Vendor ,Sonicwall Firewalls ,Secure Mobile Access ,Sonicwave Access Points ,Breaches Put Spotlight ,Like Hoffman ,Staff Editor ,Dark Reading ,View Full ,பிராண்டன் ஹாஃப்மேன் ,நேரம் வேட் ,அல்லி உருகும் ,கெல்லி ஷெரிடன் ,தோல் பதனிடுதல் ஜான்சன் ,காப்பீடு தொழில்நுட்பம் ,கட்சி ஆபத்து ,மைக்ரோசாஃப்ட் ,பாதுகாப்பானது கைபேசி நுழைவு ,போன்ற ஹாஃப்மேன் ,ஊழியர்கள் ஆசிரியர் ,இருள் ரீடிஂக் ,பார்வை முழு ,

© 2024 Vimarsana

comparemela.com © 2020. All Rights Reserved.