article thumbnail

Multiple Vulnerabilities Found in Citrix SD-WAN Center and SD-WAN Appliances

Tenable

Tenable Research has discovered multiple critical vulnerabilities in both Citrix SD-WAN Center and the SD-WAN appliance itself that could allow a remote, unauthenticated attacker to compromise the underlying operating systems of each. On July 2, Citrix released SD-WAN version 10.2.3 What’s the attack vector?

WAN 40
article thumbnail

CVE-2021-1609: Critical Remote Code Execution Vulnerability in Cisco Small Business VPN Routers

Tenable

While both flaws exist due to improper validation of HTTP requests and can be exploited by sending specially crafted HTTP requests, CVE-2021-1610 can only be exploited by an authenticated attacker with root privileges. In January 2019, Cisco published advisories for two different vulnerabilities in its RV320 and RV325 WAN VPN routers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Critical OS Command Injection Vulnerability in Citrix SD-WAN Center Discovered

Tenable

Tenable Research has discovered a critical vulnerability in Citrix SD-WAN Center that could lead to remote code execution. On April 10, Citrix released a security bulletin for CVE-2019-10883, an operating system (OS) command injection vulnerability in Citrix SD-WAN Center 10.2.x and NetScaler SD-WAN Center 10.0.x

WAN 42
article thumbnail

CVE-2020-12271: Zero-Day SQL Injection Vulnerability in Sophos XG Firewall Exploited in the Wild

Tenable

The attack targets the XG Firewall administration interface, which is accessible via the user portal, over HTTPs, or on the WAN zone. They discovered that this also affected systems when the port used for the administration interface or user portal was also used to expose a firewall service, such as the SSL VPN. Fixed Versions.

Firewall 101
article thumbnail

The 8 Best Practices for Reducing Your Organization’s Attack Surface

Ivanti

For example, it can be used to implement restrictions so an IoT device can only communicate with its application server and no other IoT devices, or to prevent someone in one department from accessing any other department’s systems. #5: One area in which organizations can easily improve both security and employee experience is authentication.

article thumbnail

Network Troubleshooting in Depth: A Complete Guide

Kentik

Run commands based on your device’s network operating system to see some of the configuration. You can take a look at system logs that the device has kept for any routing or forwarding errors. This information can be found in logs of AAA (Authentication, Authorization, and Accounting) events from your devices.

Network 114
article thumbnail

PAN-OS 10.0 for the World’s First ML-Powered NGFW Now Available

Palo Alto Networks

our most significant release to date, and the operating system at the heart of the World’s First ML-Powered Next-Generation Firewall (NGFW) – making proactive, intelligent security a reality for our customers. . Although 5G mandates authentication and encryption, these do not automatically equate to security. 5G Networks.

WAN 85