Active Exploitation Of Critical SonicWall RCE bug

A vulnerability being targeted is of critically high severity. The flaw affects SonicWall’s Secure Mobile Access (SMA) gateways. “The bug, found by Rapid7 Lead Security Researcher Jacob Baines, is an unauthenticated stack-based buffer overflow tracked as CVE-2021-20038 that impacts SMA 100 series appliances (including SMA 200, 210, 400, 410, and 500v) even when the web application firewall (WAF) is enabled.”

Binaré recommends smart device manufacturers as well as businesses that use smart devices to check them for vulnerabilities with Binaré’s automated IoT vulnerability management and firmware analysis platform to make the use of these devices safe. Assess the security risk your IoT device possesses for FREE with our Demo here:

More information about the incident:

Stealthy Firmware Bootkit Leveraged By APT In Targeted Attacks

Kaspersky researchers have discovered the third known case of a firmware bootkit in the wild. The malicious implant, Dubbed MoonBounce, is hidden within Unified Extensible Firmware Interface (UEFI) firmware, an essential part of computers, in the SPI flash, a storage component external to the hard drive. “Such implants are notoriously difficult to remove and are of limited visibility to security products.”

Binare’s firmware analysis & monitoring platform will check your IoT device for wide-ranging devastating vulnerabilities. Check your firmware/IoT device for FREE with our Demo here:

More information about the incident:

SolarWinds, ZyXEL devices Under New Log4j attack

“Cybercriminals looking to capitalize on the Log4Shell vulnerability are attacking devices from SolarWinds and ZyXEL that are known to have used the Log4j library inside their software.” Microsoft that spotted the most urgent of these attacks found a threat actor abusing Log4Shell in combination with a zero-day vulnerability in the SolarWinds Serv-U file-sharing server. The security issue can be tracked as CVE-2021-35247. Akamai security researcher Larry Cashdollar also reported spotting a Mirai DDoS botnet going after ZyXEL networking devices.

Binaré has come up with a solution that prevents businesses from cyber-attacks. Binaré is concerned about security of IoT device your business is using. Come to our web page and check your device with our FREE Demo! The link for the web page:  

More information about the incident:

Vulnerable IDEMIA Biometric Readers Allow Hackers to Unlock Doors

A security flaw impacting multiple IDEMIA biometric identification devices is of high severity (the flaw has a CVSS score of 9.1). The bug can be exploited by malicious third-parties to unlock doors and turnstiles. “The attacker could also exploit the bug to cause a denial of service (DoS) condition by sending a reboot command to the vulnerable device, according to an advisory published by IDEMIA.

Binaré’s platform will check your IoT device, e.g. biometric reader, for a wide range of vulnerabilities and security issues and will give you a detailed report on them. Make a step towards security of your business already today: try our FREE Demo at!

More information about the incident:

Newly Discovered Sysjoker Backdoor Targets Windows, Linux, and Mac Devices

A previously-undocumented malware has been found by researchers. The backdoor called SysJoker is written in C++ and targets Windows, Linux, and Mac systems. “Once it finds a target, SysJoker masquerades as a system update and generates its C2 by decoding a string retrieved from a text file hosted on Google Drive. “

Binaré provides you not only with the platform but also with professional services that will help your business to avoid cyberattacks. Get an improved cybersecurity posture with Binaré’s expert and advisory services! Sign up here and we will reach out to you as soon as possible.

More information about the incident:

Free icons courtesy of by authors: Hight Quality Icons, JunGSa, Freepik, Smashicons, Eucalyp, juicy_fish

Leave a Reply