A proof-of-concept exploit has been published for CVE-2024-53704, which affects SonicWall NGFWs
Summary
A proof-of-concept exploit has been published for CVE-2024-53704, which affects SonicWall NGFWs
The following platforms are known to be affected:
Threat details
Introduction
A proof-of-concept (PoC) exploit has been published by security researchers for an authentication bypass vulnerability in the SonicOS SSL VPN component. SonicWall appliances provide virtual private network (VPN) and 'next-gen' firewall capabilities.
SonicWall formally disclosed and released security updates addressing CVE-2024-53704 on 07 January 2025. Successful exploitation of CVE-2024-53704 could allow a remote, unauthenticated attacker to bypass authentication and hijack a legitimate SSL VPN session.
Researchers at Bishop Fox have stated 'an attacker with control of an active SSL VPN session can read the user’s Virtual Office bookmarks, obtain a client configuration profile for NetExtender, open a VPN tunnel, access private networks available to the hijacked account, and log out the session (terminating the user’s connection as well).'
Threat updates
Remediation advice
Affected organisations must review SonicWall security advisory SNWLID-2025-0003 and apply the relevant updates.
Remediation steps
Definitive source of threat updates
CVE Vulnerabilities
Last edited: 14 February 2025 2:12 pm