• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
cropped BoostIT Invoice Logo scaled 1 e1642102882713

Boost IT

IT Management & Cybersecurity

  • SERVICES
    • IT MANAGEMENT >
      • Take an IT Self-Assessment
      • IT Assessment
      • 24/7 Help Desk Support
      • Remote Workforce
      • Software Updates
      • Remote Server Monitoring
      • Reporting & Documentation
      • Wi-Fi
    • CYBERSECURITY >
      • Take a Cybersecurity Self-Assessment
      • Cybersecurity Assessment
      • Endpoint Detection & Response
      • Multi-Factor Authentication (MFA / 2FA)
      • Security Operations Center (SOC) Support
      • HeatShield Perimeter Firewall
    • IT CONSULTING >
      • vCIO – Virtual CIO
    • CLOUD >
      • Data Backup & Disaster Recovery
      • Microsoft Office 365 & E-mail
      • Cloud File-Sharing Platform
      • Business Phone System
    • Frequently Asked Questions
  • OUR CLIENTS
    • Engineering Firms
    • Financial Services Firms
    • Healthcare Companies
    • Law Firms
    • Non-Profits
    • Real Estate Firms
    • Testimonials
    • Transition to Boost IT
  • OUR TEAM
    • One IT Question
    • Our Proven Process
    • Our Partners
  • BLOG
  • CONTACT
    • Book a Meeting
    • Client Portal
    • Remote Support
You are here: Home / Cybersecurity / SonicWALL firewall vulnerability

SonicWALL firewall vulnerability

July 9, 2014 by Boost IT

vulnerability

Our engineering team was just configuring some SonicWALL firewalls that we manage for clients and we came across a SonicWALL firewall vulnerability worth sharing.
SonicWALL firewall vulnerability
SonicWALL firewalls have the ability to be managed via command line interface (CLI) over SSH. Two of the primary benefits for an IT group to manage them like this are speed and security. We discovered today that enabling SSH even with a strong password on SonicWALL devices with 5.9 firmware versions, maybe even 5.8 versions, with almost 100% certainty allow your network to be hacked with some widely available tools, even if you have Geo-IP filters and an IP blacklist enabled. When SSH access is turned on in the firmware versions we tested, SSH firewall rules are automatically created to be open to all public IPs.  If you have a SonicWALL firewall on your network and aren’t 100% certain that you have this vulnerability addressed, please look into it or send us an e-mail if you aren’t sure. We will be glad to help.

Filed Under: Cybersecurity Tagged With: SonicWALL

Connect With Us

  • Facebook
  • Instagram
  • LinkedIn
  • YouTube

Primary Sidebar

Have questions about cybersecurity?

We've successfully protected Healthcare, Legal, Financial Services, Engineering, Manufacturing, Non-Profit & Real Estate Development organizations for over 20 years.

Click below to see the questions on your next cyberinsurance application!

See the cyberinsurance application

Footer

Next Steps

Start with the SERVICES menu above.

Take an IT Self-Assessment.

Take a Cybersecurity Self-Assessment.

Read Case Studies about how we’ve helped our clients transform their organizations.

View Testimonials from current clients.

Featured Posts

IT Management Trends: Navigating the Digital Era

The Importance of Email Encryption: Safeguarding Your Digital Communications

IT Consultation Services: Unlocking the Power of Expertise in a Tech-Driven Era

Demystifying the World of Cybersecurity Consulting: A Comprehensive Guide

IT Management Benefits: A Guide to Maximizing Efficiency and Productivity

Email Communication Security: Safeguarding Your Digital Conversations

Office Location

© 2000–2023 · Boost IT, LLC · Coverage Area

  • SERVICES
  • OUR CLIENTS
  • OUR TEAM
  • BLOG
  • CONTACT