SMA 100 Series: This product remains under investigation for a vulnerability, however we can issue the following guidance on deployment use cases:.SonicWall SonicWave APs: No action is required from customers or partners.Customers are safe to use SMA 1000 series and their associated clients. No action is required from customers or partners. SMA 1000 Series: This product line is not affected by this incident.No action is required from customers or partners. It may be used with all SonicWall products. NetExtender VPN Client: While we previously communicated NetExtender 10.X as potentially having a zero-day, that has now been ruled out.SonicWall Firewalls: All generations of SonicWall firewalls are not affected by the vulnerability impacting the SMA 100 series (SMA 200, SMA 210, SMA 400, SMA 410, SMA 500v).SonicWall engineering teams continued their investigation into probable zero-day vulnerabilities and have produced the following update regarding the impacted products: NOT AFFECTED MFA MUST BE ENABLED ON ALL SONICWALL SMA, FIREWALL & MYSONICWALL ACCOUNTS Disable NetExtender access to the firewall(s) or restrict access to users and admins via an allow-list/whitelist for their public IPs.Or configure whitelist access on the SMA directly itselfįOR FIREWALLS WITH SSL-VPN ACCESS VIA NETEXTENDER VPN CLIENT VERSION 10.X.Use a firewall to only allow SSL-VPN connections to the SMA appliance from known/whitelisted IPs.IMPORTANT: Organizations with active SMA 100 Series appliances or with NetExtender 10.x currently have the following options: FOR SMA 100 SERIES The SMA 1000 series is not susceptible to this vulnerability and utilizes clients different from NetExtender. The NetExtender VPN client and SMB-oriented SMA 100 series are used for providing employees/users with remote access to internal resources.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |