Compliance

When Your Firewall Vendor Causes the Breach

When Your Firewall Vendor Causes the Breach

You Trusted Your Security Vendor. What If That Was the Vulnerability?

Most small businesses and government contractors think about cybersecurity in a straightforward way: you buy a firewall, you install it, and it keeps the bad guys out. Your vendor is on your side. They're the good guys.

The Marquis v. SonicWall lawsuit is asking a very uncomfortable question: what happens when the vendor is the breach?

What the SonicWall Lawsuit Actually Alleges

According to reporting from Security News (February 26, 2026), the Marquis case centers on a striking allegation — that threat actors leveraged SonicWall's own customer configuration data to execute a ransomware attack. In other words, the attacker didn't brute-force their way through the firewall. They allegedly used information held by the firewall vendor to do it.

This flips the conventional threat model on its head. Businesses spend enormous energy hardening their own networks, training employees, and patching internal systems. But if a vendor storing your device configurations, credentials, or network topology data is compromised, your perimeter controls may not matter at all.

The lawsuit raises a question that every business owner and IT administrator should be asking right now: who is legally and financially responsible when a breach originates from a trusted vendor's infrastructure?

This Isn't an Isolated Incident

If the SonicWall case feels like a one-off, consider what else broke the same week.

Also reported by Security News on February 26, 2026: a maximum-severity zero-day vulnerability in Cisco SD-WAN had been actively exploited for three years before it was detected. Three years. A sophisticated threat actor had persistent, silent access through a trusted network infrastructure product — the kind of product organizations deploy specifically to improve security and visibility.

And according to The Hacker News weekly recap from March 2, 2026, the broader threat landscape right now is defined by attackers targeting trusted network infrastructure — SD-WAN appliances, firewalls, cloud configurations — through small access control gaps and the abuse of trusted services. The perimeter tools you rely on are themselves becoming attack surfaces.

The pattern is clear: your vendor's security posture is now part of your attack surface.

What This Means for Your Compliance Standing

SB 220 Safe Harbor (Ohio Businesses)

Ohio's SB 220 offers businesses meaningful legal protection in the event of a breach — but only if you can demonstrate that you implemented a recognized cybersecurity framework. The safe harbor doesn't care where the breach originated. If ransomware encrypts your systems because a vendor leaked your configuration data, you still have to prove your security program was reasonable and documented.

Vendor risk management is increasingly considered part of any credible security program. If you can't show that you evaluated the security practices of your critical technology vendors, your safe harbor claim gets much harder to defend.

CMMC Level 1 (Government Contractors)

For businesses pursuing or maintaining CMMC Level 1 compliance, the stakes are even higher. Practice AC.1.001 through AC.1.002 and MP.1.001 require you to control access to Federal Contract Information (FCI) — but if a third-party vendor holding data about your network environment is compromised, that control boundary has already been violated.

A vendor-side breach won't automatically disqualify you from CMMC, but it will trigger questions from your contracting officer and potentially your assessor. If you don't have a vendor risk policy documented, that's a gap — and gaps cost contracts.

Cyber Insurance

This is where things get expensive fast. Most cyber insurance policies have exclusions or sublimits for third-party vendor incidents. If your insurer determines that the breach originated outside your network — through a vendor you selected and trusted — they may dispute the claim, reduce the payout, or invoke an exclusion clause.

The Marquis lawsuit will likely produce discovery documents that reshape how insurers underwrite vendor-related risk. Expect policy language to tighten. Expect premiums to reflect vendor posture. The time to get ahead of this is now, not at renewal.

Three Things You Should Do Right Now

1. Audit what your vendors can see. Make a list of every security vendor that has access to your network configurations, credentials, or topology data. This includes firewall vendors, managed service providers, remote monitoring tools, and cloud security platforms. For each one, ask: what data do they hold about my environment, and what happens if they're breached?

2. Read your vendor agreements. Most vendor contracts include liability limitations that heavily favor the vendor. If a vendor-side breach costs you $200,000 in recovery and their contract caps liability at $5,000, you're absorbing the rest. Know what you signed before you need to file a claim.

3. Document your vendor risk process. Even a simple vendor security questionnaire, completed annually and stored in your compliance records, demonstrates due diligence. For SB 220 safe harbor and CMMC purposes, documentation is often the difference between protection and exposure.

The Uncomfortable Truth About Perimeter Security

Firewalls, SD-WAN appliances, and endpoint security tools are not passive objects. They're software systems operated by companies with their own vulnerabilities, their own data practices, and their own breach risk. When you deploy a security product, you're also inheriting a slice of that vendor's risk profile.

That doesn't mean you should stop using these tools — it means you should stop assuming they're inherently safe. Trust, in cybersecurity, has to be verified.


Take Action: Don't Wait for Your Vendor to Make Headlines

The SonicWall lawsuit and the Cisco SD-WAN zero-day are reminders that threats don't always look the way you expect. Proactive scanning and visibility into your own environment — before an attacker maps it for you — is one of the most practical steps any business can take.

Oscar Six Security's Radar gives small businesses, government contractors, and IT teams an affordable way to see their exposure before it becomes an incident. At $99 per scan, it's built for organizations that need real answers without enterprise-level budgets.

Explore what Radar can do for your business at oscarsixsecurityllc.com/#solutions.

Focus Forward. We've Got Your Six.