Critical SonicWall VPN Flaw Exposed: Hackers Can Hijack Sessions Without Password – Update Now

Critical SonicWall VPN Flaw Exposed: Hackers Can Hijack Sessions Without Password - Update Now

Critical SonicWall SSL VPN Vulnerability: Authentication Bypass Exploit Revealed

Security researchers at Bishop Fox have disclosed detailed exploitation methods for a critical vulnerability (CVE-2024-53704) affecting SonicWall’s SonicOS SSL VPN application. This high-risk security flaw enables attackers to bypass authentication and hijack active VPN sessions.

Vulnerability Impact and Exploitation
– Affects multiple versions of SonicOS (7.1.x, 7.1.2-7019, and 8.0.0-8035)
– Impacts Gen 6, Gen 7, and SOHO series firewalls
– Approximately 4,500 exposed servers remain unpatched
– Enables unauthorized network access through session hijacking

Technical Details
The exploit works by:
1. Sending crafted session cookies with base64-encoded null bytes
2. Targeting the SSL VPN authentication endpoint (‘/cgi-bin/sslvpnclient’)
3. Exploiting incorrect session validation
4. Gaining access to:
– VPN client configurations
– Virtual Office bookmarks
– Internal network resources
– Private network access

Available Security Updates
Patched versions include:
– SonicOS 8.0.0-8037 and later
– 7.0.1-5165 and higher
– 7.1.3-7015 and higher
– 6.5.5.1-6n and higher

Given the public availability of the exploit code, immediate patching is crucial for all affected systems to prevent unauthorized access and potential network breaches.

Share This Article