SonicWall advises customers to reset their login details after backup files containing user configurations are revealed.
In a recent development, SonicWall has issued an urgent advisory due to security researchers discovering exposed MySonicWall configuration backup files containing encrypted passwords, pre-shared keys, and TLS certificates used by SonicOS appliances. These files, if accessed by threat actors, could potentially allow them to decrypt and leverage credentials for unauthorized social security network access.
To mitigate this risk, SonicWall has outlined three critical phases: Containment, Remediation, and Monitoring.
Containment
To immediately reduce exposure, SonicWall recommends disabling or restricting all WAN-based management services before performing password resets. This includes SSL VPN and IPsec VPN services, which should be turned off under Network → SSL VPN → Server Settings and Network → IPsec VPN → Rules and Settings, respectively. Administrators must also disable HTTP/HTTPS & SSH Management on each WAN interface, found under Network → System → Interfaces. SNMP v3 access should be disabled under Device → Settings → SNMP to prevent unauthorized SNMP GET/SET commands from exposing Engine IDs or community strings.
Remediation
After remediation, services should be re-enabled gradually, verifying each with a successful login test and SSH key rotation. Encryption keys in the Global Management System (GMS) IPSec Management Tunnel mode must be updated. Passwords for all Local Users, LDAP, RADIUS, TACACS+ servers, Dynamic DNS, Clearpass NAC, and email log automation accounts should be reset. Shared secrets on these servers should be rotated with SHA-256-hashed values.
Administrators must reset passwords for all Local Users and re-enroll TOTP bindings. WAN interface credentials for L2TP/PPPoE/PPTP and cellular WWAN must be refreshed. All IPsec VPN pre-shared keys require replacement with new AES-256 encrypted secrets.
Monitoring
Continuous monitoring of the system and audit logs is essential. Logs should be exported to CSV for detailed analysis. SIEM integrations using Syslog over TLS 1.2 should be leveraged for secure forwarding.
Additional Measures
Customers relying on automated workflows are reminded to update scripts referencing the old credentials. Restricting inbound NAT/Access Rules to known/trusted IP addresses further prevents attackers from reconnecting after credential changes.
The Cybersecurity and Infrastructure Security Agency (CISA) has also issued an urgent advisory recommending essential credential resets after security researchers discovered that MySonicWall configuration backup files were inadvertently stored in public storage.
It is implied that a credential reset is a recommended action to mitigate the risk of unauthorized social security network access. SonicOS 6.5.5.1 and 7.3.0 have a dynamic enforcement option that blocks user accounts until a new password is set, ensuring containment remains effective even if WAN restrictions cannot be fully applied.
In conclusion, following these guidelines can help maintain the social security of your SonicOS appliances and prevent potential unauthorized network access. Stay vigilant and keep your systems updated for optimal protection.
Read also:
- InformationWarfare in the Modern Era: Enhancing an Information Strategy for today's Battlefield and Botnet Threats
- U.S. intelligence leader alleges UK succumbed to pressure over Apple data access request
- Politician's Rivalry Slips into Online Traps Made for Stealing Information via Social Media Phishes
- Top 46 Significant Tech Firms Based in Toronto