SonicWall Firewall Vulnerability Allows VPN Session Hijacking: Urgent Patch Required

February 11, 2025

Bishop Fox security researchers have released a comprehensive report detailing the exploitation of a vulnerability, CVE-2024-53704, in certain versions of SonicWall's SonicOS SSLVPN application. This flaw allows hackers to bypass the authentication process, enabling them to hijack active SSL VPN sessions without needing authentication. SonicWall had previously alerted users to the high exploit potential of this vulnerability in a January 7 bulletin, urging immediate firmware updates for their SonicOS firewalls.

In an email to customers, SonicWall warned, "We have identified a firewall vulnerability that is susceptible to actual exploitation for customers with SSL VPN or SSH management enabled, and that should be mitigated immediately by upgrading to the latest firmware." This vulnerability allows unauthorized network access to a remote attacker by enabling them to hijack active SSL VPN sessions.

On January 22, Bishop Fox researchers confirmed SonicWall's concerns about the exploit potential of the vulnerability. They announced that they had developed an exploit for CVE-2024-53704 following a significant reverse-engineering effort. The full exploitation details were released by Bishop Fox after allowing time for system administrators to apply the available patches.

The exploit involves sending a specially crafted session cookie, containing a base64-encoded string of null bytes, to the SSL VPN authentication endpoint at '/cgi-bin/sslvpnclient.' This triggers an incorrect validation of the session, assuming the request is associated with an active VPN session. This results in the victim being logged out and the attacker gaining access to the session. The attacker can then access the user's Virtual Office bookmarks, obtain VPN client configuration settings, open a VPN tunnel to the internal network, and gain access to private network resources.

The researchers tested the validity of their analysis by creating a proof-of-concept exploit code to simulate an authentication bypass attack. The response headers showed that they had successfully hijacked an active session. The researchers stated, "With that, we were able to identify the username and domain of the hijacked session, along with private routes the user was able to access through the SSL VPN."

The vulnerability affects SonicOS versions 7.1.x (up to 7.1.1-7058), 7.1.2-7019, and 8.0.0-8035. These versions run on various models of Gen 6 and Gen 7 firewalls, as well as SOHO series devices. Fixes are available in SonicOS 8.0.0-8037 and later, 7.0.1-5165 and higher, 7.1.3-7015 and higher, and 6.5.5.1-6n and higher.

As of February 7, Bishop Fox reports that approximately 4,500 internet-exposed SonicWall SSL VPN servers have not applied the security updates fixing CVE-2024-53705. With a working proof-of-concept exploit now publicly available, administrators are urged to apply the updates immediately as the exploitation risk for CVE-2024-53705 has significantly increased.

Related News

Latest News

Like what you see?

Get a digest of headlines, vulnerabilities, risk context, and more delivered to your inbox.

Subscribe Below

By submitting this form, you’re giving us permission to email you. You may unsubscribe at any time.

Accelerate Security Teams

Continuously identify and prioritize the risks that are most critical in your environment, and validate that your remediation efforts are reducing risk. An always-on single source-of-truth of your assets, services, and vulnerabilities.