{"id":249865,"date":"2021-02-21T00:15:20","date_gmt":"2021-02-20T23:15:20","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=249865"},"modified":"2021-06-17T10:07:26","modified_gmt":"2021-06-17T08:07:26","slug":"weiteres-sonicwall-sicherheitsupdate-fr-sma-100-schwachstelle","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2021\/02\/21\/weiteres-sonicwall-sicherheitsupdate-fr-sma-100-schwachstelle\/","title":{"rendered":"2. SonicWall Sicherheitsupdate f&uuml;r SMA 100-Schwachstelle"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>[<a href=\"https:\/\/borncity.com\/win\/2021\/02\/21\/weiteres-sonicwall-sicherheitsupdate-fr-sma-100-schwachstelle\/\" target=\"_blank\" rel=\"noopener\">English<\/a>]Der Hersteller SonicWall hat ein zweites Firmware-Sicherheitsupdate f\u00fcr seine SMA 100 ver\u00f6ffentlicht, mit dem eine 0-day-Schwachstelle geschlossen werden soll. Administratoren sollten dieses Update sofort installieren, da die Schwachstelle ausgenutzt wird.<\/p>\n<p><!--more--><\/p>\n<p>SonicWall hatte Ende Januar 2021 vor einem 0-Day Exploit, der aktiv zum Angriff auf die SonicWall Secure Mobile Access Ger\u00e4te der SMA 100-Serie ausgenutzt wird, gewarnt. SonicWall hatte dazu <a href=\"https:\/\/www.sonicwall.com\/support\/product-notification\/urgent-security-notice-sonicwall-confirms-sma-100-series-10-x-zero-day-vulnerability-feb-1-2-p-m-cst\/210122173415410\/\" target=\"_blank\" rel=\"noopener\">diese Sicherheitswarnung<\/a> mit Stand 1. Februar 2021 zum Thema ver\u00f6ffentlicht. Dort wurde eine Zero-Day-Schwachstelle im Code der SMA 100-Serie 10.x best\u00e4tigt. SMA 100-Firmware vor 10.x ist von dieser Zero-Day-Schwachstelle nicht betroffen. Ich hatte im Blog-Beitrag <a href=\"https:\/\/borncity.com\/blog\/2021\/02\/02\/herstellerwarnung-vor-0-day-exploit-fr-sonicwall-sma-100\/\">Herstellerwarnung vor 0-Day Exploit f\u00fcr SonicWall SMA 100<\/a> \u00fcber den Sachverhalt berichtet. Vom Hersteller war ein Patch f\u00fcr den 2. Februar 2021 angek\u00fcndigt und ausgeliefert worden (siehe <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/sonicwall-fixes-actively-exploited-sma-100-zero-day-vulnerability\/\" target=\"_blank\" rel=\"noopener\">diesen Artikel<\/a> von Bleeping Computer).<\/p>\n<h2>Zweites Update nachgereicht<\/h2>\n<p>Die Kollegen von Bleeping Computer weisen in nachfolgendem <a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1363036707935948806\" target=\"_blank\" rel=\"noopener\">Tweet<\/a> darauf hin, dass SonicWall ein weiteres Firmware-Update zum Absichern gegen die 0-Day-Schwachstelle im Code SMA 100-Serie.<\/p>\n<p><a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1363036707935948806\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"SonicWall SMA 100 firmware update\" src=\"https:\/\/i.imgur.com\/rx77V9U.png\" alt=\"SonicWall SMA 100 firmware update\" \/><\/a><\/p>\n<p>SonicWall hat zum 19. Februar 2021 den Sicherheitshinweis <a href=\"https:\/\/www.sonicwall.com\/support\/product-notification\/additional-sma-100-series-10-x-and-9-x-firmware-updates-required-updated-feb-19-2-p-m-cst\/210122173415410\/\" target=\"_blank\" rel=\"noopener\">Additional SMA 100 Series 10.X And 9.X Firmware Updates Required [Updated Feb. 19, 2 P.M. CST]<\/a> ver\u00f6ffentlicht. Darin hei\u00dft es:<\/p>\n<blockquote><p>Following up on the Feb. 3 firmware update outlined below, SonicWall is announcing the availability of new firmware versions for both 10.x and 9.x code on the SMA 100 series products, comprised of SMA 200, 210, 400, 410 physical appliances and the SMA 500v virtual appliance.<\/p>\n<p>SonicWall conducted additional reviews to further strengthen the code for the SMA 100 series product line.<\/p>\n<p>The new SMA 10.2 firmware includes:<\/p>\n<ul>\n<li>Code-hardening fixes identified during an internal code audit<\/li>\n<li>Rollup of customer issue fixes not included in the Feb. 3 patch<\/li>\n<li>General performance enhancements<\/li>\n<li>Previous SMA 100 series zero-day fixes posted on Feb. 3<\/li>\n<\/ul>\n<p>The new 9.0 firmware includes:<\/p>\n<ul>\n<li>Code-hardening fixes identified during an internal code audit<\/li>\n<\/ul>\n<p><strong>SMA 100 Series Devices with 10.x or 9.x Firmware that Require Upgrade:<\/strong><\/p>\n<ul>\n<li><strong>Physical Appliances<\/strong>: SMA 200, SMA 210, SMA 400, SMA 410<\/li>\n<li><strong>Virtual Appliances<\/strong>: SMA 500v (Azure, AWS, ESXi, HyperV)<\/li>\n<\/ul>\n<p><strong>All organizations using SMA 100 series products with 10.x or 9.x firmware<\/strong> should apply the respective patches <strong>IMMEDIATELY<\/strong>.<\/p>\n<p>If you already applied the SMA 10.2.0.5-29sv firmware posted on Feb 3., <strong>you still need to upgrade to SMA 10.2.0.6-32sv<\/strong>. If you skipped the SMA 10.2.0.5-29sv firmware update from Feb. 3, you only need to apply the latest SMA 10.2.0.6-32sv firmware.<\/p><\/blockquote>\n<p>Im Sicherheitshinweis finden sich detaillierte Hinweise f\u00fcr ein Upgrade der SMA 9.x oder SMA 10.x Firmware.<\/p>\n<p><strong>\u00c4hnliche Artikel:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/blog\/2021\/01\/23\/sonicwall-netextender-schwachstelle-ausgenutzt\/\">Sonicwall NetExtender-Schwachstelle durch APT-Gruppe ausgenutzt<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2020\/10\/18\/schwachstelle-cve-2020-5135-in-sonicwall-firewall-os\/\">Schwachstelle CVE-2020-5135 in SonicWall-Firewall OS<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/02\/02\/herstellerwarnung-vor-0-day-exploit-fr-sonicwall-sma-100\/\">Herstellerwarnung vor 0-Day Exploit f\u00fcr SonicWall SMA 100<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Der Hersteller SonicWall hat ein zweites Firmware-Sicherheitsupdate f\u00fcr seine SMA 100 ver\u00f6ffentlicht, mit dem eine 0-day-Schwachstelle geschlossen werden soll. Administratoren sollten dieses Update sofort installieren, da die Schwachstelle ausgenutzt wird.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426],"tags":[4328],"class_list":["post-249865","post","type-post","status-publish","format-standard","hentry","category-sicherheit","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/249865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=249865"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/249865\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=249865"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=249865"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=249865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}