home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,306 of 2,445   
   Mike Powell to All   
   US government flags worry   
   18 Apr 25 10:19:00   
   
   TZUTC: -0500   
   MSGID: 1039.consprcy@1:2320/105 2c67a87e   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   US government flags worrying SonicWall flaw, so update now   
      
   Date:   
   Fri, 18 Apr 2025 13:03:00 +0000   
      
   Description:   
   SonicWall updates its security advisory, and CISA added the flaw to KEV.   
      
   FULL STORY   
      
   The US Cybersecurity and Infrastructure Security Agency (CISA) has added an   
   old SonicWall vulnerability to its Known Exploited Vulnerabilities (KEV)   
   catalog, confirming that it is being used in the wild.    
      
   As a result, Federal Civilian Executive Branch (FCEB) agencies have three   
   weeks to install the patch or stop using the product entirely.    
      
   In late 2021, SonicWall released a security advisory, warning its users about   
   an improper neutralization vulnerability affecting multiple SonicWall Secure   
   Mobile Access (SMA) appliances. At the time, the company said the bug could    
   be used to take down vulnerable endpoints with a Denial-of-Service (DoS)   
   attack. However, the company has now updated the advisory to warn about   
   in-the-wild abuse and to upgrade its severity score from medium to high    
   (7.2).    
      
   "Improper neutralization of special elements in the SMA100 management   
   interface allows a remote authenticated attacker to inject arbitrary commands   
   as a 'nobody' user, which could potentially lead to code execution,"    
   SonicWall said.    
      
   The flaw affects SMA 200, SMA 210, SMA 400, SMA 410, and SMA 500v (ESX, KVM,   
   AWS, Azure) devices.    
      
   At the same time, CISA added the bug to KEV, warning about abuse in the wild.   
   While its Binding Operational Directive 22-01 (which forces organizations to   
   install the patch) only applies to government agencies, those in the private   
   sector should take note when KEV gets a new entry.    
      
   "These types of vulnerabilities are frequent attack vectors for malicious   
   cyber actors and pose significant risks to the federal enterprise," CISA    
   said.    
      
   In 2021, SonicWall suffered one of its largest attacks ever, when a threat   
   actor tracked as UNC2447 abused an SQL injection vulnerability in the SMA100   
   instance to gain unauthorized access to networks. Following the breach, they   
   deployed the Sombrat backdoor and a ransomware variant dubbed FiveHands.    
      
    Via BleepingComputer   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/us-government-flags-worrying-sonicwall-   
   flaw-so-update-now   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca