First published: 25 Jan 2021
Last updated: 04 Feb 2021

Content written for

Small & medium business
Large organisations & infrastructure
Government

Update

SonicWall has released a patch for the now confirmed vulnerability within the SMA 100 series 10.x code. SMA 100 firmware prior to 10.x is unaffected by this vulnerability. 

For information on the patch, affected devices and recommended mitigation advice, please refer to SonicWall product notification.

Background

On 22 January 2021, cyber security vendor SonicWall identified an internal systems breach using a likely zero-day in the SonicWall NetExender VPN client and Secure Mobile Access (SMA) products. On 23 January 2021, SonicWall provided an updated stating that only the SMA 100 Series is potentially vulnerable and customers may continue to use the NetExtender component for remote access as it is not susceptible to exploitation.

For information on the affected devices and recommended mitigation advice, please refer to SonicWall product notification.

Additional information and supporting tools

The ACSC is monitoring the situation and will continue to advise Australian organisations as required. The ACSC encourages all organisations to continually assess and apply the Essential Eight strategies to protect their systems. 

Assistance

Organisations that have been impacted or require assistance can contact the ACSC via 1300 CYBER1.

Was this information helpful?

Thanks for your feedback!

Optional

Tell us why this information was helpful and we’ll work on making more pages like it