Important memory leak vulnerabilities in F5 firewalls: Patch immediately

Information security specialists reported the detection of two security flaws affecting several firewall models developed by technology firm F5 Networks. According to the report, successful exploitation would allow malicious hackers to deploy severe attack scenarios. Below are brief descriptions of the reported flaws, in addition to their assigned tracking keys and scores according to the […]

3 critical vulnerabilities in Sophos Firewall and other company products

Sophos security teams announced the fixing of a critical remote code execution (RCE) vulnerability in the Sophos Firewall family of products for home and enterprise environments. Sophos Firewall includes TLS and encrypted network traffic inspection, sandboxing, packet scanning, and intrusion prevention systems. Tracked as CVE-2022-1040, the vulnerability received a score of 9.8/10 under the Common […]

Input validation, access control bypass and XSS vulnerabilities in the pfSense firewall: Update immediately

Cybersecurity specialists report the detection of multiple vulnerabilities in pfSense, an open source and custom distribution of FreeBSD optimized for use in devices such as firewalls or routers. According to the report, successful exploitation of these flaws would allow threat actors to deploy some dangerous hacking variants. Below are brief descriptions of the reported flaws, […]

Anyone can bypass the Google and AWS Web Application Firewall (WAF) with an 8 KB POST request

Most web applications today must be protected against multiple hacking variants, such as remote code execution (RCE), SQL injections, cross-site scripting (XS) attacks, and other common security issues. The so-called web application firewalls (WAF) are the most common security solutions, and within these Google Cloud Armor has become a recurring choice among Google Cloud Load […]

US, UK Agencies Warn of New Russian Botnet Built from Hacked Firewall Devices

Intelligence agencies in the U.K. and the U.S. disclosed details of a new botnet malware called Cyclops Blink that’s been attributed to the Russian-backed Sandworm hacking group and deployed in attacks dating back to 2019. “Cyclops Blink appears to be a replacement framework for the VPNFilter malware exposed in 2018, which exploited network devices, primarily […]

25 vulnerabilities in F5 firewall and other products: Patch immediately

On Wednesday, specialists from the technology firm F5 Networks published a detailed report on the finding of 25 vulnerabilities in some of its products. According to reports, successful exploitation of these flaws could lead to various variants of hacking, including cross-site scripting (XSS) and denial of service (DoS) attacks. Below are brief descriptions of the […]

Critical vulnerability in Cisco ASA and Cisco FTD allows to shutdown the firewall & VPN. Patch immediately

Cybersecurity specialists from Positive Technologies report the detection of three critical vulnerabilities in the Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) firewalls, developed by Cisco and whose exploitation would allow threat actors to deploy denial of service (DoS) attacks, among other risk scenarios. According to the report, the flaws received scores of 8.6/10 […]

How to hack into WAF (Web application firewall) using XSS attacks?

Cross-site scripting (XSS) attacks are a variant of code injection that involves the use of specially crafted scripts on legitimate websites for malicious purposes in order to breach the security of web applications potentially affected by some known security flaw. Given the popularity of this attack technique, many researchers have specialized in analyzing this attack […]

Google publishes zero-day vulnerability in Windows firewall and AppContainer affecting every version. Patch not available

Project Zero, Google’s cybersecurity unit, published research detailing its analysis of the Windows firewall and AppContainer, Microsoft’s runtime environment that restricts applications so that security risks can be avoided before installing new software. In its report, Project Zero points to the detection of a severe vulnerability in AppContainer that Microsoft had chosen not to address, […]

Hackers Weaponize Firewalls & Middleboxes for Reflected DDoS Attacks

Cybersecurity specialists from the University of Maryland and the University of Colorado Boulder have recently published the verdict of a flaw that they have found in the form of some middlebox models.  They claimed that it is a term relating to computer network devices that modify, examine, filter, and manage traffic with a motive other […]

Attackers Can Weaponize Firewalls and Middleboxes for Amplified DDoS Attacks

Weaknesses in the implementation of TCP protocol in middleboxes and censorship infrastructure could be weaponized as a vector to stage reflected denial of service (DoS) amplification attacks against any target, surpassing many of the existing UDP-based amplification factors to date. Detailed by a group of academics from the University of Maryland and the University of […]

Find Firewall & CDN used a website during Pentest with VXSCAN

Information gathering phase shows how an pentester should prepare for his next phases. Because in this phase pentester have to collect information about their target as much possible. Their are many automation tools which are used in gathering information. Today we will show an python script used in gathering information. Vxscan is an extensive scanning […]

2 critical vulnerabilities in Fortinet’s FortiWeb web application firewall can give cyber criminals access to your applications

Cybersecurity experts report the discovery of a critical vulnerability in FortiWeb, the web application firewall (WAF) of the technology firm Fortinet. The vulnerability could be exploited for arbitrary code execution, which poses a critical risk to affected system operators, especially if the flaw is chained to other recently discovered bugs. Positive Technologies researcher Andrey Medov […]

Watch Out! Zyxel Firewalls and VPNs Under Active Cyberattack

Taiwanese networking equipment company Zyxel is warning customers of an ongoing attack targeting a “small subset” of its security products such as firewall and VPN servers. Attributing the attacks to a “sophisticated threat actor,” the firm noted that the attacks single out appliances that have remote management or SSL VPN enabled, namely in the USG/ZyWALL, […]

SonicWall firewall vulnerability can be exploited to install ransomware like Colonial Pipeline. Patch now

SonicWall security teams released a security alert to invite their customers to install patches that address a critical post-auth vulnerability present in local versions of the Network Security Manager (NSM) firewall solution. Tracked as CVE-2021-20026, the flaw resides in NSM versions prior to v2.2.0-R10-H1 and was fixed with the release of v2.2.1-R6 and 2.2.1-R6 Enhaced. […]

DarkSide ransomware affiliates are using Sophos firewall and VPN vulnerability to hack. Researchers track down 5 affiliates of them

FireEye cybersecurity specialists published details of a recent research related to the DarkSide ransomware operation. This week experts released reports on five groups allegedly associated with this ransomware-as-a-service (RaaS) platform, responsible for some of the most devastating attacks recently detected. Among the most recent victims of this encryption malware is Colonial Pipeline, one of the […]

Critical XSS flaw in PfSense open source firewall; update now

Netgate Solutions announced the release of an update to fix a critical inter-site scripting vulnerability (XSS) impacting its PfSense solution, a FreeBSD-based open source offering for firewall routing and support under an Apache 2.0 license. This flaw lies in the services_wol.php function of PfSense CE and PfSense PlusWebGUI was discovered by William Costa, researcher at […]

This Office 365 phishing email can easily evade your firewall security

A cybercriminal group is deploying a phishing campaign that uses a fraudulent website to collect Microsoft Office 365 credentials by creating html snippets stored locally and remotely. This method involves integrating various hidden HTML pieces into JavaScript files to get the fake login interface in which the victim delivers their sensitive information. Potential victims receive […]