Through the course of standard collaboration and testing, SonicWall has verified, tested and published patches to mitigate three zero-day vulnerabilities to its hosted and on-premises email security products.
In at least one known case, these vulnerabilities have been observed to be exploited โin the wild.โ It is imperative that organizations using SonicWall Email Security hardware appliances, virtual appliances or software installation on Microsoft Windows Server immediately upgrade to the respective SonicWall Email Security version listed below.
SonicWall Hosted Email Security (HES) was patched on April 19, 2021, and no action is required from organizations that are only using the hosted email security product.
Step-by-step guidance on how to apply the updates is available on an in-depth knowledgebase (KB) article.
AFFECTED VERSION | PATCHED VERSION | PSIRT ADVISORY ID | APPLICABLE CVEs |
|
| ||
|
| ||
|
|
Support for End-of-Life Email Security Products
SonicWall Email Security versions 7.0.0-9.2.2 are also impacted by the above vulnerabilities. However, these legacy versions have reached end of life (EOL) and are no longer supported. Organizations using these legacy product versions and have an active support license can download the latest Email Security versions from their MySonicWall account.
Customers without an active support license should contact their SonicWall SecureFirst partner to renew the license and upgrade to the latest SonicWall Email Security version. To find your local partner, please visit the SonicWall Partner Locator.
IPS Signatures Detect Exploitation
SonicWall has automatically deployed Intrusion Prevention System (IPS) signatures to help detect and block attacks that attempt to leverage the above vulnerabilities. The below signatures have already been applied to SonicWall firewalls with active security subscriptions.
About the CVEs
For additional details on threat actor behavior, please review Mandiant's blog.