This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

KBA 135412 - Fixing SQL injection vulnerability, impact on SSL VPN

The article suggests disabling HTTPS Admin Services and User Portal access on the WAN interface. While I have never had the Admin Services interface enabled, I have had the User Portal, as this was required to set up remote clients for VPN access. Is this still the case at least with a SSL VPN? If I have the User Portal disabled, will I have to manually send the EXE for the VPN client, and will I have to resend it, if any VPN settings/policies are changed?



This thread was automatically locked due to age.
Parents
  • Same here. We strictly disable https on WAN zone on all our client's firewall and only limit access to a few trusted static IPs.

    however, I can see that some firewalls got affected

    Alert
    14:45
     
    Hotfix applied for SQL Injection and partially cleaned. Additional steps may be required to secure your network. Please read KBA-135412 for possible next steps.

     

    this is very unpleasant. I'm currently resetting all admin passwords and analyzing log files.

Reply
  • Same here. We strictly disable https on WAN zone on all our client's firewall and only limit access to a few trusted static IPs.

    however, I can see that some firewalls got affected

    Alert
    14:45
     
    Hotfix applied for SQL Injection and partially cleaned. Additional steps may be required to secure your network. Please read KBA-135412 for possible next steps.

     

    this is very unpleasant. I'm currently resetting all admin passwords and analyzing log files.

Children