Skip to main content

A proof-of-concept exploit has been published for CVE-2024-53704, which affects SonicWall NGFWs

Summary

A proof-of-concept exploit has been published for CVE-2024-53704, which affects SonicWall NGFWs

The following platforms are known to be affected:

Threat details

Introduction

proof-of-concept (PoC) exploit has been published by security researchers for an authentication bypass vulnerability in the SonicOS SSL VPN component. SonicWall appliances provide virtual private network (VPN) and 'next-gen' firewall capabilities.

SonicWall formally disclosed and released security updates addressing CVE-2024-53704 on 07 January 2025. Successful exploitation of CVE-2024-53704 could allow a remote, unauthenticated attacker to bypass authentication and hijack a legitimate SSL VPN session.

Researchers at Bishop Fox have stated 'an attacker with control of an active SSL VPN session can read the user’s Virtual Office bookmarks, obtain a client configuration profile for NetExtender, open a VPN tunnel, access private networks available to the hijacked account, and log out the session (terminating the user’s connection as well).'

Threat updates

Remediation advice

Affected organisations must review SonicWall security advisory SNWLID-2025-0003 and apply the relevant updates.

Remediation steps

Definitive source of threat updates

CVE Vulnerabilities

Last edited: 14 February 2025 2:12 pm