This article is more than 1 year old
If you want to practice writing exploits and worms, there's a big hijacking hole in SonicWall firewall VPNs
And some 800,000 installations facing the internet, patches are available
A critical vulnerability in a SonicWall enterprise VPN firewall can be exploited to crash the device or remotely execute code on it, reverse engineers said this week.
The stack-based buffer overflow (CVE-2020-5135) uncovered by infosec outfit Tripwire can be triggered by an “unauthenticated HTTP request involving a custom protocol handler” – and, most worryingly, could have been deployed by an “unskilled attacker.”
The biz said about 800,000 devices were discoverable through device search engine Shodan.io at the time it made its findings, which are lightly detailed on its blog.
With the vuln being exploitable before authentication, anyone could send malformed requests to a target device – either causing a denial-of-service condition by crashing it, or potentially exploiting it to remotely execute code without local authentication; Tripwire says such an attack is "likely feasible." A worm could be developed that infects a machine via the VPN and then seeks out other vulnerable devices to hijack.
Affected versions are: SonicOS 220.127.116.11-79n and earlier, 18.104.22.168-4n and earlier, 22.214.171.124-93o and earlier, SonicOSv 126.96.36.199-44v-21-794 and earlier, and SonicOS 188.8.131.52-1. The security hole is closed in these newly released versions: SonicOS 184.108.40.206-83n, 220.127.116.11-1n, 18.104.22.168-94o, SonicOSv 6.5.4.v-21s-987, and SonicOS 22.214.171.124-2 and onwards.
Zyxel storage, firewall, VPN, security boxes have a give-anyone-on-the-internet-root hole: Patch right nowREAD MORE
In a statement SonicWall said it “was contacted by a third-party research team regarding issues related to SonicWall next-generation virtual firewall models (6.5.4v)." The spokesman went on to say that SonicWall’s own engineers discovered even more vulns while reproducing Tripwire’s findings, going on to develop patches for the whole lot.
“Immediately upon discovery, SonicWall researchers conducted extensive testing and code review to confirm the third-party research. This analysis lead to the discovery of additional unique vulnerabilities to virtual and hardware appliances requiring Common Vulnerabilities and Exposures (CVE) listings... The PSIRT team worked to duplicate the issues and develop, test and release patches for the affected products,” said the spokesman.
He concluded: “At this time, SonicWall is not aware of a vulnerability that has been exploited or that any customer has been impacted.” SonicWall credited Craig Young at Tripwire and Nikita Abramov at Positive Technologies for reporting the stack-overflow bug.
A batch of 11 patches have been released by SonicWall. Sysadmins are advised to check for updates and deploy these sooner rather than later. ®