Researchers from the cybersecurity firm NCC Group said they detected an “indiscriminate use of an exploit” against a vulnerability in SonicWall networking products.
While NCC Group did not share technical details on the vulnerability it said it informed SonicWall of their findings.
“We've identified and demonstrated exploitability of a possible candidate for the vulnerability described and sent details to SonicWall - we've also seen indication of indiscriminate use of an exploit in the wild,” reads NCC Group message on Twitter.
In an update posted last week, SonicWall said it continues to “investigate the SMA 100 Series, however the presence of a potential zero-day vulnerability remains unconfirmed.” However, NCC Group researchers believe they identified the same zero day bug used in an attack on its internal systems last month. At the time, the company described the culprit behind the attack as “highly sophisticated threat actors.”
At the end of January, former member of LulzSec published a zero-day exploit for a popular SonicWall VPN application, which utilizes the same vulnerabilities used by a notorious hacktivist known as Phineas Phisher to compromise the Italian spyware vendor Hacking Team and other companies. Following publication of the exploit code, SonicWall said that the vulnerabilities that this exploit relies on had been already patched.