SonicWall vulnerability fixed, but researchers say the patch took 17 days

SonicWall vulnerability fixed, but researchers say the patch took 17 days

Security researchers in the United Kingdom said it took SonicWall more than two weeks to patch a vulnerability in 1.9 million SonicWall user groups, affecting some 10 million managed devices and 500,000 organizations.


In a blog released by Pen Test Partners, the researchers said the response took far too long for this type of flaw. SonicWall countered by saying that the company responded promptly and no vulnerabilities were exploited.


According to the blog, attackers could have potentially taken advantage of an IDOR to access the SonicWall cloud service. An IDOR is a flaw in an API or web application that does not check authorization properly, allowing an attacker to access unauthorized data.


“Using this degree of access, a hacker could potentially modify firewall rules and/or VPN access, giving himself remote access to any organization,” Ken Munro, partner and founder of Pen Test Partners, told SC Media. “A hacker could inject ransomware, or any manner of other attacks. The IDOR allowed any user to be added to any group at any organization. All a user needed was his or her own account and they could add it to anyone else’s group through a public cloud service.”


In an email statement to SC Media, SonicWall said a vulnerability in its cloud-based product registration system was quickly researched, verified and promptly patched on August 26. About two weeks earlier, SonicWall said it had identified the reported vulnerability as part of its PSIRT program (the notification from Pen Test Partners) and rapidly created a fix that underwent full testing and certification.


SonicWall claims that at no time did it ..

Support the originator by clicking the read the rest link below.