Remove Authentication Remove Blog Remove Firewall Remove WAN
article thumbnail

CVE-2020-12271: Zero-Day SQL Injection Vulnerability in Sophos XG Firewall Exploited in the Wild

Tenable

Sophos pushes a hotfix to address a SQL injection vulnerability in Sophos XG Firewall that was exploited in the wild. On April 22, Sophos published a knowledge base entry on the Sophos Community regarding the discovery of a zero-day vulnerability in the Sophos XG Firewall that was exploited in the wild. Background. Proof of concept.

Firewall 101
article thumbnail

CVE-2021-1609: Critical Remote Code Execution Vulnerability in Cisco Small Business VPN Routers

Tenable

While both flaws exist due to improper validation of HTTP requests and can be exploited by sending specially crafted HTTP requests, CVE-2021-1610 can only be exploited by an authenticated attacker with root privileges. In January 2019, Cisco published advisories for two different vulnerabilities in its RV320 and RV325 WAN VPN routers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

CVE-2021-20016: Zero-Day Vulnerability in SonicWall Secure Mobile Access (SMA) Exploited in the Wild

Tenable

Look for anomalous requests to: /cgi-bin/management That do not also have a preliminary request to: /__api__/v1/logon (200) /__api__/v1/logon/ /authenticate Indicating auth bypass. At the time this blog post was published, there was no public proof-of-concept available for CVE-2021-20016. Rich Warren (@buffaloverflow) January 31, 2021.

Mobile 53
article thumbnail

How to Meet the Need for APM + NPM

Kentik

In our recent blog post, “ The Network Also Needs to be Observable ,” we made a case for network observability as an important facet of observability platforms. The reality is that the problem can be anywhere: application, service mesh, API gateway, authentication, Kubernetes, backbone networking, WAN, cloud networking, firewall, etc.

Meeting 64
article thumbnail

Modernizing Critical Infrastructure Requires Security Transformation

Palo Alto Networks

Critical Infrastructure Blog Series. In this blog, we take a look at why successful digital transformation of CI/OT requires that senior leadership work together to ensure that security transformation happens in unison with the OT modernization. The successful cyber attacks on Colonial Pipeline, JBS USA Holdings Inc.

article thumbnail

Mastering Cloud Transformation for Business: Cloud Foundations

Perficient

In this blog series, we’re exploring the four pillars of a successful Cloud Transformation: Program Model, Cloud Foundations, Portfolio Transformation, and Enterprise App Migration. In our first blog , we discussed the importance of a Program Model and the key elements that should be considered for successful implementation.

Cloud 111
article thumbnail

Palo Alto Networks Recognized in Critical Capabilities Report

Palo Alto Networks

Highest Scores for Enterprise Edge and Distributed Enterprise Use Cases In December 2022, for the eleventh consecutive time, Palo Alto Networks was named a Leader in the Gartner® Magic Quadrant™ for Network Firewalls. And on May 16th, Gartner published its Critical Capabilities for Network Firewalls report.

Report 91