Skip to content

Security Advisory: SonicOS Vulnerability In Firewall Web Management Interface

DESCRIPTION:

SonicWall physical and virtual firewalls running certain versions of SonicOS may contain a vulnerability that could be leveraged for an unauthenticated Denial-of-Service (DoS) attack by sending a specially crafted POST request to the web interface.  

At this time, there is no indication that the discovered vulnerability is being exploited in the wild.

SonicWall STRONGLY advises customers to apply the respective SonicOS patch immediately. See below for specific SonicOS versions.

IMPACT

The vulnerability requires Web Management to be enabled on the WAN/LAN interface and requires the precondition of an ongoing active management session. For example, an administrator is logged into the web interface or Global Management System (GMS) / Network Security Manager (NSM) are configured to manage the firewall over HTTPS on the WAN interface.

Other GMS/NSM management modes, enumerated below, are not impacted while WAN management is disabled on the firewall.

The SSL-VPN portal on the firewall, Virtual Office, is NOT affected.

Implementation Impact
GMS IPSec tunnel mode Not Impacted
GMS Existing VPN tunnel mode Not Impacted
GMS Zero Touch Not Impacted
NSM Zero Touch Not Impacted
GMS Management (Zero Touch Mode) Not Impacted
NSM Management (Zero Touch Mode) Not Impacted

RESOLUTION

Updating SonicOS Firmware (Recommended)

After reviewing this security advisory, please go to MySonicWall and download the appropriate SonicOS patch release from the table below. The following article provides information on “How to Update SonicOS Firmware.”

TEMPORARY MITIGATION: RESTRICT ACCESS TO SONICWALL MANAGEMENT

Until the below patches can be applied, SonicWall strongly recommends that administrators limit SonicOS management access to trusted sources (and/or disable management access from untrusted internet sources) by modifying the existing SonicOS Management access rules (SSH/HTTPS/HTTP Management). This will only allow management access from trusted source IP addresses.

Please refer to the following knowledgebase articles:

In addition, it is a recommended practice to update the default management port to a custom port to prevent attacks on well-known ports.

SONICOS PATCH RELEASES

In the table below, find the existing SonicOS version that a firewall is currently running (SonicOS Running Version). Select the SonicOS patch release from the same row, download that version from MySonicWall, and update the SonicOS firmware using the steps linked above.

Platforms SonicOS Running Version  SonicOS Patch Release (Update to version or later) 
TZ, NSa (GEN7) 7.0.1-R1262 and older 7.0.1-R1456
NSv (Virtual GEN7) 7.0.1-R1219 and older  7.0.1-R1282/1283
NSsp (GEN7) 7.0.1-R514 and older 7.0.1-R579
NSa, TZ, SOHO W, SuperMassive 92xx/94xx/96xx (GEN6+) 6.5.4.7 and older 6.5.4.8-89n
NSv (Virtual: VMWare/Hyper-V/AWS/Azure/KVM) All versions (virtual) 6.5.4.v_21s-1288
NSsp 12K, SuperMassive 9800 6.5.1.12-1n and older 6.5.1.12-3n
SuperMassive 10K 6.0.5.3-94o and older TBD/Pending
NSA, TZ, SOHO (GEN5) 5.9.1.13 and older TBD/Pending

SonicWall has provided patches for recent major and minor releases, as shown in the table above. For devices with hotfixes or language-specific releases, please follow the instructions above to restrict SonicWall management access (HTTPS/HTTP/SSH) to trusted sources and/or disable management access from untrusted internet sources. Once complete, coordinate with SonicWall support to select the appropriate patch with the hotfix.

Previous article SonicWall: New Firmware and Software Releases
Next article Security Notice: SonicWall Email Security Zero-Day Vulnerabilities

More SonicWall News Posts

  • Product Security Notice:  SONICWALL SSL-VPN SMA100 Series Vulnerabilities
    December 7, 2023 Esther McNally

    Product Security Notice: SONICWALL SSL-VPN SMA100 Series Vulnerabilities

    SONICWALL SSL-VPN SMA100 version 10.X is affected by multiple vulnerabilities Overview CVE-2023-44221: Post Authentication OS Command Injection Vulnerability (CVSS Score: 7.2) Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege...

    Read now
  • Turn On Your MFA
    November 9, 2023 Esther McNally

    Turn On Your MFA

    With millions of stolen credentials currently up for sale, the time for stronger authentication is now. In “Star Trek: The Next Generation,” Jean-Luc Picard famously said, “It is possible to commit no mistakes and still lose.” This applies to many...

    Read now
  • Password Pro Tips
    November 7, 2023 Esther McNally

    Password Pro Tips

    A solid password is instrumental to keeping your important accounts and information safeguarded. October is typically associated with pumpkin spice lattes, college football, crunching leaves underfoot and ghostly fun, but did you know it’s also Cybersecurity Awareness Month? This is...

    Read now