Article 5XXG0 WatchGuard failed to explicitly disclose critical flaw exploited by Russian hackers

WatchGuard failed to explicitly disclose critical flaw exploited by Russian hackers

by
Dan Goodin
from Ars Technica - All content on (#5XXG0)
GettyImages-1299483011-800x451.jpg

Enlarge

Security vendor WatchGuard quietly fixed a critical vulnerability in a line of its firewall devices and didn't explicitly disclose the flaw until Wednesday, following revelations hackers from Russia's military apparatus exploited it en masse to assemble a giant botnet.

Law enforcement agencies in the US and UK on February 23 warned that members of Sandworm-among the Russian government's most aggressive and elite hacker groups-were infecting WatchGuard firewalls with malware that made the firewalls part of a vast botnet. On the same day, WatchGuard released a software tool and instructions for identifying and locking down infected devices. Among the instructions was ensuring appliances were running the latest version of the company's Fireware OS.

Putting customers at unnecessary risk

In court documents unsealed on Wednesday, an FBI agent wrote that the WatchGuard firewalls hacked by Sandworm were vulnerable to an exploit that allows unauthorized remote access to the management panels of those devices." It wasn't until after the court document was public that WatchGuard published this FAQ, which for the first time made reference to CVE-2022-23176, a vulnerability with a severity rating of 8.8 out of a possible 10.

Read 9 remaining paragraphs | Comments

index?i=JwES_4dBWxQ:rP1t3gaHP50:V_sGLiPB index?i=JwES_4dBWxQ:rP1t3gaHP50:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments