Dell SonicWALL Notice Concerning CVE-2014-6271 / CVE-2014-7169 – GNU Bash Vulnerability Dear Customer, Researchers have found a critical vulnerability ( CVE-2014-6271 / CVE-2014-7169 ) in the GNU Bash shell (aka “ShellShock”) which was reported on the NIST National Vulnerability Database on 9/24/2014. Dell SonicWALL Firewalls are NOT Affected Dell SonicWALL firewalls (TZ, NSA, E-Class NSA, SuperMassive) are NOT affected by the GNU Bash vulnerability (no Bash or other *nix shells exist in SonicOS). Additionally, firewalls with an active Intrusion Prevention Service, as of Sep 24th 2014, have signatures to protect vulnerable servers and devices positioned behind the firewalls. Dell SonicWALL E-Class Secure Remote Access/Secure Mobile Access are NOT Affected The E-Class Secure Remote Access (E-Class SRA) and Secure Mobile Access (SMA) appliance products are NOT vulnerable (the GNU Bash shell is not utilized internally for product functionality). SMB Secure Remote Access (SMB SRA) Appliance Firmware Versions Affected, IF Web Application Firewall (WAF) is NOT Enabled SMB SRA Firmware All 7.5 versions prior to 7.5.0.10-27sv All 7.0 and earlier versions prior to 7.0.1.1-3sv Impact The SRA’s Web Application Firewall (WAF) protection should be enabled as the SRA’s WAF functionality provides itself protection (SRA is NOT affected when enabled). Affected versions/configurations should patch and/or enable WAF immediately (instructions below). Recommended Action Upgrade 7.5 to 7.5.0.10-27sv (or newer) Upgrade 7.0 to 7.0.1.1-3sv (or newer) SMB Secure Remote Access (SMB SRA) Web Application Firewall (WAF) Provides Protection Against GNU Bash Vulnerability Dell SonicWALL has released a WAF signature (1603 Bash Code Injection) for the SMB SRA which protects the SMB SRA appliance itself, as well as web servers and devices behind the SRA. To configure the WAF protection, go to the ‘Web Application Firewall > Status’ tab and enable Web Application Firewall. If ‘Apply Signature Updates Automatically’ is enabled, then Signatures should take effect automatically. If it is not enabled, then admins have to manually go into Web Application Firewall > Status page and click on ‘Apply’ Check the box for High/Medium Priority Attacks for both Detect and Prevent. To verify the configuration search for Signatures 9011 and 6013 and ensure they are enabled for both detection and prevention on the ‘Web Application Firewall > Signatures’ page For more advanced WAF Configuration please reference the WAF Admin Guide. Email Security Appliance Firmware Versions Affected Email Security Appliance Email Security Appliances running version 8.0.3 or earlier. Impact The Email Security appliance is NOT vulnerable through the standard access ports, such as SMTP (port 25) or HTTP/HTTPS web user interfaces (port 80/443), however for versions 8.0.3 or earlier, the appliance CLI (snwlcli) accessed via SSH is vulnerable, and the CLI should be disabled as a workaround or upgrade to 8.0.4+ (or 7.4.8 patch). For versions 8.0.3 or earlier, disable the appliance CLI (snwlcli) as workaround (instructions below), then upgrade to Email Security 8.0.4 (or 7.4.8 patch) during next maintenance cycle. Recommended Action Email Security Appliance Instructions to Disable SSH to CLI (snwlcli) To disable SSH to CLI, login to the CLI (either using SSH, the serial port console, or the KVM connection on the appliance). $ ssh snwlcli@emailsecurityappliance For CLI access you must login as snwlcli user. Login: admin Password: SNWLCLI> help sshd sshd [{on|off}] With no arguments displays sshd status With on or off, enables or disables sshd SNWLCLI> sshd off SNWLCLI> quit Connection to emailsecurityappliance closed. Now SSH connection is refused $ ssh snwlcli@ emailsecurityappliance ssh: connect to host emailsecurityappliance port 22: Connection refused To re-enable SSH, access the snwlcli from the serial port console or from the KVM connection on the back of the appliance. Management and Reporting Appliance Firmware Versions Affected Global Management System (GMS) and Analyzer / Viewpoint Appliance Impact Recommended Action GMS /Analyzer / Viewpoint Appliances running version 7.2 or earlier. The GMS / Analyzer / Viewpoint appliance is NOT vulnerable through the standard access ports, such HTTP/HTTPS web user interfaces (port 80/443), however for versions earlier than 7.2.7222.1727, the appliance CLI (snwlcli) accessed via SSH is vulnerable, and the hotfix below should be applied. Apply Hotfix: 7.2: sw_gmsvp_all_eng_7.2.hotfix.dts.150000.sig 7.1: sw_gmsvp_all_eng_7.1.hotfix.dts.150000.sig 7.0: sw_gmsvp_all_eng_7.0.hotfix.dts.150000.sig 6.0: sw_gmsvp_all_eng_6.0.hotfix.dts.150000.sig 5.1: sw_gmsvp_all_eng_5.1.hotfix.dts.150000.sig For new installs, deploy version 7.2.7222.1727 or greater.
© Copyright 2024 ExpyDoc