Skip to content

SonicWall advises customers to reset their login details after backup files containing user configurations are revealed.

SonicWall urges customers to reset essential credentials following the discovery of exposed MySonicWall configuration backup files on public storage by security researchers.

SonicWall advises customers to revise their login details due to the exposure of configuration...
SonicWall advises customers to revise their login details due to the exposure of configuration backup files

SonicWall advises customers to reset their login details after backup files containing user configurations are revealed.

In a recent development, SonicWall has issued an urgent advisory due to security researchers discovering exposed MySonicWall configuration backup files containing encrypted passwords, pre-shared keys, and TLS certificates used by SonicOS appliances. These files, if accessed by threat actors, could potentially allow them to decrypt and leverage credentials for unauthorized social security network access.

To mitigate this risk, SonicWall has outlined three critical phases: Containment, Remediation, and Monitoring.

Containment

To immediately reduce exposure, SonicWall recommends disabling or restricting all WAN-based management services before performing password resets. This includes SSL VPN and IPsec VPN services, which should be turned off under Network → SSL VPN → Server Settings and Network → IPsec VPN → Rules and Settings, respectively. Administrators must also disable HTTP/HTTPS & SSH Management on each WAN interface, found under Network → System → Interfaces. SNMP v3 access should be disabled under Device → Settings → SNMP to prevent unauthorized SNMP GET/SET commands from exposing Engine IDs or community strings.

Remediation

After remediation, services should be re-enabled gradually, verifying each with a successful login test and SSH key rotation. Encryption keys in the Global Management System (GMS) IPSec Management Tunnel mode must be updated. Passwords for all Local Users, LDAP, RADIUS, TACACS+ servers, Dynamic DNS, Clearpass NAC, and email log automation accounts should be reset. Shared secrets on these servers should be rotated with SHA-256-hashed values.

Administrators must reset passwords for all Local Users and re-enroll TOTP bindings. WAN interface credentials for L2TP/PPPoE/PPTP and cellular WWAN must be refreshed. All IPsec VPN pre-shared keys require replacement with new AES-256 encrypted secrets.

Monitoring

Continuous monitoring of the system and audit logs is essential. Logs should be exported to CSV for detailed analysis. SIEM integrations using Syslog over TLS 1.2 should be leveraged for secure forwarding.

Additional Measures

Customers relying on automated workflows are reminded to update scripts referencing the old credentials. Restricting inbound NAT/Access Rules to known/trusted IP addresses further prevents attackers from reconnecting after credential changes.

The Cybersecurity and Infrastructure Security Agency (CISA) has also issued an urgent advisory recommending essential credential resets after security researchers discovered that MySonicWall configuration backup files were inadvertently stored in public storage.

It is implied that a credential reset is a recommended action to mitigate the risk of unauthorized social security network access. SonicOS 6.5.5.1 and 7.3.0 have a dynamic enforcement option that blocks user accounts until a new password is set, ensuring containment remains effective even if WAN restrictions cannot be fully applied.

In conclusion, following these guidelines can help maintain the social security of your SonicOS appliances and prevent potential unauthorized network access. Stay vigilant and keep your systems updated for optimal protection.

Read also:

Latest