After a security incident in which a backup of configuration data was leaked, SonicWall is requesting that passwords and login credentials be reset as soon as possible.
SonicWall, a firewall solutions provider, admits fault for a recent security incident. The company discovered that a backup containing configuration data was accidentally accessible via its cloud environment. As a precaution, SonicWall is calling on customers to reset administrator accounts.
Less than Five Percent
The file contained data from the MySonicWall platform. According to SonicWall, it was an old file created during internal tests and backups. The company assures BleepingComputer that actual password data is additionally encrypted and that the incident could affect at most ‘five percent of firewall installations’.
Although there are no indications that the file was actually misused, SonicWall has responded preventively. Attackers could still use the data to identify affected firewalls. The company requests administrators to reset their passwords as soon as possible. Furthermore, certain user preference files have been modified to further mitigate risks.
Resetting Passwords
SonicWall shares guides explaining how users can reset their password and check their settings to prevent misuse. Users who log in via single sign-on (SSO) are not affected, unless they also use local login methods.
In a separate document, SonicWall provides additional information about the technical measures taken. For instance, the configuration files were modified to prevent sensitive information from being shared again. The company also says that additional monitoring has been enabled.
SonicWall states that it continues to work with external experts to assess the impact and prevent recurrence. It urges customers to thoroughly check their accounts for suspicious activity.
The affected environment only concerns the MySonicWall platform. Other products or services of the company are reportedly not involved in the incident. However, they may be susceptible to other bugs.
