Home > Cyber News > CVE-2019-7481 VPN Flaw Weaponized by Ransomware Operators

CVE-2019-7481 VPN Flaw Weaponized by Ransomware Operators

CVE-2019-7481 VPN Flaw Weaponized by Ransomware Operators-sensorstechforum
Security researchers are warning that cybercriminals are leveraging an older SQL injection security flaw, known as CVE-2019-7481. The vulnerability is located in SonicWall Secure Remote Access (SRA) 4600 devices that run firmware versions 8.x and 9.x.

CVE-2019-7481 Currently Used in Attacks against Organizations

The vulnerability is used in attacks against various organizations. According to CrowdStrike’s recent investigations, there is evidence indicating a root cause via VPN access, without the use of brute force techniques. “These investigations have a common denominator: All organizations used SonicWall SRA VPN appliances running firmware,” CrowdStrike said.

CrowdStrike Intelligence researchers confirmed that CVE-2019-7481 affects SRA devices running the latest versions of 8.x and 9.x firmware, and that the latest versions of Secure Mobile Access (SMA) firmware do not mitigate the CVE for SRA devices, the security company added.

The increased reliance on VPN devices has led to various criminal organizations using loopholes in these devices’ security to breach organizations. Examples include the eCrime group and various nation-state actors. In relation to the 2019 vulnerability, the research team has identified “big game hunting (BGH) ransomware actors” exploiting this vulnerability against older SonicWall SRA 4600 VPN devices during various incident response investigations.

Furthermore, in February, SonicWall’s Product Security Incident Response Team announced a new zero-day vulnerability, CVE-2021-20016, impacting its SMA (Secure Mobile Access) devices. The newly discovered vulnerability affects the SMA 100 series product, and updates are required for versions running 10.x firmware. “SonicWall did not state if or how this newest exploit affects any older SRA VPN devices still in production environments,” CrowdStrike pointed out.

According to the official technical description, CVE-2019-7481 is a vulnerability in SonicWall SMA100 that could allow unauthenticated user to gain read-only access to unauthorized resources.

CVE-2021-22893 Pulse Secure VPN Bug Exploited in April

In April, another VPN zero-day was actively exploited by threat actors. CVE-2021-22893 is classified as a critical zero-day in Pulse Secure VPN devices, and it has been exploited by nation-state hackers in attacks against US defense, finance, and government targets. Attacks against European targets were observed, according to a Pulse Secure advisory. The zero-day allowed remote code execution attacks with admin-level access to vulnerable devices.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree