[內容說明:]
轉發 國家資安資訊分享與分析中心 NISAC-ANA-202104-1017
研究人員發現SonicWall之電子郵件安全產品存在安全漏洞(CVE-2021-20021~20023),攻擊者可藉由特製封包, 利用此漏洞建立管理員帳號,進而可遠端執行任意程式碼。
情資分享等級: WHITE(情資內容為可公開揭露之資訊)
[影響平台:]
受影響SonicWall之電子郵件安全產品如下:
● SonicWall Email Security 10.0.9.6173(不含)以前版本(Windows)
● SonicWall Email Security 10.0.9.6177(不含)以前版本(Hardware & ESXi Virtual Appliance)
● SonicWall Hosted Email Security 10.0.9.6173(不含)以前版本
[建議措施:]
目前SonicWall官方已針對此漏洞釋出更新程式,請各機關聯絡設備維護廠商參考下方網址進行版本更新:
https://www.sonicwall.com/support/product-notification/security-notice-sonicwall-email-security-zero-day-vulnerabilities/210416112932360/
[參考資料:]1.https://www.sonicwall.com/support/product-notification/security-notice-sonicwall-email-security-zero-day-vulnerabilities/210416112932360/2.https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-00073.https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-00084.https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-00105.https://www.fireeye.com/blog/threat-research/2021/04/zero-day-exploits-in-sonicwall-email-security-lead-to-compromise.html6.https://www.ithome.com.tw/news/143987