Initiatieven voor
Als nationale autoriteit voor cyberveiligheid heeft het CCB verschillende initiatieven ontwikkeld voor specifieke doelgroepen die hier worden gepresenteerd.
Reference:
Advisory #2020-032
Version:
1.0
Affected software:
SonicOS 6.0.5.3-93o and earlier versions.
SonicOS 6.5.1.11-4n and earlier versions.
SonicOS 6.5.4.7-79n and earlier versions.
SonicOS 7.0.0.0-1.
SonicOSv 6.5.4.4-44v-21-794 and earlier versions.
Type:
Denial of Service (DOS), Remote Code Execution (RCE)
CVE/CVSS:
CVE-2020-5135 – CVSSv3 9.4
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0010 https://www.tripwire.com/state-of-security/vert/sonicwall-vpn-portal-critical-flaw-cve-2020-5135/ https://threatpost.com/critical-sonicwall-vpn-bug/160108/
Successful exploitation of this flaw could allow a remote attacker to launch a persistent denial of service (DoS) type attack by sending a malicious request to the firewall. It is also possible to obtain Remote Code Execution (RCE) with a bit more effort.
Security researchers of Tripwire disclosed a buffer overflow vulnerability, tracked as CVE-2020-5135, affecting SonicWall Network Security Appliance (NSA). According to researchers, this flaw exists within HTTP/HTTPS service used for product management and SSL VPN remote access. The exposed systems on the public internet can be used to crash the device and prevent users to from connecting to corporate resources. More worrying, Remote code execution is achievable with a bit more work given that researchers were able to divert execution flow through stack corruption, indicating that a code-execution exploit is likely feasible. With an RCE payload an attacker could easily create a sizeable botnet with this used in a worm.
CERT.be recommends to Network administrators to install the latest updates released by the vendor for the affected versions - https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0010.