Critical SonicWall Firewall Flaw Under Active Attack Following Exploit Release

Critical SonicWall Firewall Flaw Under Active Attack Following Exploit Release

SonicWall Firewalls Under Active Attack Following Exploit Code Release

Critical Security Vulnerability Threatens Network Security

A critical authentication bypass vulnerability (CVE-2024-53704) in SonicWall firewalls is now being actively exploited following the release of proof-of-concept (PoC) exploit code. The vulnerability affects the SSLVPN authentication mechanism in SonicOS versions 7.1.x, 7.1.2-7019, and 8.0.0-8035, impacting both Gen 6 and Gen 7 firewalls and SOHO series devices.

Impact and Exploitation

The security flaw allows remote attackers to:
– Bypass multi-factor authentication
– Hijack active SSL VPN sessions
– Gain unauthorized network access
– Access private information

Current Threat Landscape

Arctic Wolf cybersecurity firm has confirmed active exploitation attempts following the PoC release. Approximately 4,500 unpatched SonicWall SSL VPN servers remain exposed online, according to recent scans by Bishop Fox researchers.

Mitigation Steps

SonicWall has issued urgent recommendations:
1. Immediate firmware upgrade to patched versions
2. Limiting access to trusted sources
3. Disabling SSLVPN if updates cannot be applied
4. Restricting internet access where unnecessary

Previous incidents involving SonicWall firewalls have been linked to Akira and Fog ransomware attacks, with Arctic Wolf documenting at least 30 intrusions through SonicWall VPN accounts in recent months.

Share This Article