A week after warning IT departments of a possible problem with its SMA 100 devices, SonicWall has confirmed a ‘critical’ fault in its firmware.
On Monday afternoon the company issued a statement saying it has confirmed a zero-day vulnerability on SMA 100 series units running version 10.x code. The vulnerability affects both physical and virtual SMA 100 10.x devices including the SMA 200, SMA 210, SMA 400, SMA 410, SMA 500v.
SMA 100 firmware prior to 10.x is unaffected.
UPDATE: SonicWall issued a firmware update SMA 10.2.0.5-29sv on Wednesday afternoon for physical devices, urging administrators to apply it immediately. Here is a knowledge base article for how to apply it.
The patch addresses vulnerabilities tracked under PSIRT Advisory ID SNWLID-2021-0001. These include an exploit to gain admin credential access and a subsequent remote-code execution attack.
After applying the patch admins must reset the passwords for any users who may have logged in to the device via the web interface. SonicWall also recommends enabling two-factor authentication on accounts as a safety measure.
SonicWall firewalls and SMA 1000 series appliances, as well as all respective VPN clients, are unaffected and remain safe to use.