Three SonicWall Zero-Day Bugs Under Active Attack – Patches Deployed fullz sites 2021, best site for fullz

SonicWall has recently fixed three zero-day bugs affecting its Email Security products. Though the patches are out, considering the active exploitation of the flaws, the vendors urge the customers for the update.
Recently, security researchers from FireEye discovered three zero-day bugs in the SonicWall Email Security product. As elaborated in their advisory , these vulnerabilities include the following.
FireEye confirmed the active exploitation of the zero-day bugs. Explaining the attacks, they stated,
These vulnerabilities were executed in conjunction to obtain administrative access and code execution on a SonicWall ES device. The adversary leveraged these vulnerabilities, with intimate knowledge of the SonicWall application, to install a backdoor, access files and emails, and move laterally into the victim organization’s network.
Specifically, the researchers found two of these bugs, CVE-2021-20021 and CVE-2021-20022, in March 2021, that they disclosed to SonicWall shortly. Later, they found another vulnerability, CVE-2021-20023, that they also communicated to the vendors.
Consequently, after initially deploying hotfix, SonicWall released stable patches recently. The patched versions include Email Security version (Windows) and (Hardware & ESXi Virtual Appliances).
Given that the bugs have already caught the attention of cybercriminals, all users must ensure keeping their systems updated with the latest ES versions. SonicWall has also urged the users for the same in their advisory ,
In at least one known case, these vulnerabilities have been observed to be exploited ‘in the wild.’ It is imperative that organizations using SonicWall Email Security hardware appliances, virtual appliances or software installation on Microsoft Windows Server immediately upgrade to the respective SonicWall Email Security version.
fullz sites 2021 best site for fullz

Author: wpadmin