Monday, May 12, 2025
HomeCyber Security NewsSonicBoom Attack Chain Lets Hackers Bypass Login and Gain Admin Control

SonicBoom Attack Chain Lets Hackers Bypass Login and Gain Admin Control

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity researchers have uncovered a dangerous new exploitation technique, dubbed the “SonicBoom Attack Chain,” which allows hackers to bypass authentication and seize administrative control over SonicWall Secure Mobile Access (SMA) appliances.

This attack leverages a combination of recently disclosed vulnerabilities, which have already been spotted in real-world attacks.

The SonicBoom Attack Chain essentially stitches together two severe vulnerabilities:

- Advertisement - Google News
  • CVE-2024-38475: An Apache HTTP Server “Filename Confusion” bug, discovered by Orange Tsai, enabling arbitrary file read before authentication.
  • CVE-2023-44221: A post-authentication command injection flaw, discovered by Wenjie Zhong (H4lo), which can grant remote command execution.
A whole New Attack

In combination, these flaws allow threat actors to first access sensitive system files-such as password and configuration files-using the Apache mod_rewrite flaw, and then leverage the command injection to run arbitrary code with administrative privileges.

How SonicBoom Works

The attack chain exploits intricacies in how the Apache web server processes HTTP requests, specifically abusing the mod_rewrite module’s handling of paths.

Step 1: Arbitrary File Read

The attacker sends a crafted HTTP request to the SMA appliance, exploiting the mod_rewrite vulnerability (CVE-2024-38475).

By inserting a URL-encoded question mark (e.g., %3F) into the request and carefully manipulating the path, the attacker can trick the server into revealing arbitrary files from the filesystem-including potentially sensitive authentication data.

For example, a request like:

GET /portal/../../../../etc/passwd%3F HTTP/1.1

Host: target-sma

may return the contents of the /etc/passwd file, bypassing the intended access controls.

Step 2: Command Injection and Admin Access

After extracting critical information, attackers can use the post-auth command injection vulnerability (CVE-2023-44221) to remotely execute code or escalate privileges.

If configuration or admin credentials were obtained in step one, the system is completely compromised.

Researchers at watchTowr, a threat intelligence firm, demonstrated that these attacks can be performed without any prior authentication, making every unpatched SMA device a susceptible target.

The SonicWave SMA appliance is widely used by organizations globally to secure remote access to critical applications. Its prevalence on network edges makes it a particularly attractive target for cybercriminals.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added both CVEs to its Known Exploited Vulnerabilities (KEV) catalog, warning that “immediate action is required to address ongoing exploitation.”

If successfully compromised, attackers could:

  • Steal sensitive data and credentials
  • Deploy ransomware or malware inside the corporate network
  • Pivot to attack other internal resources

SonicWall has issued urgent advisories and patches for affected SMA versions. Administrators are urged to:

  • Apply the latest updates to SMA appliances immediately
  • Monitor for suspicious activity, including unauthorized logins and file access
  • Check for unusual network traffic originating from SMA devices

Organizations unable to patch immediately are advised to take vulnerable appliances offline until mitigations are in place.

The SonicBoom Attack Chain highlights how chaining together “known” vulnerabilities can have devastating consequences, especially on edge devices. As always, prompt patching and layered defenses are the best mitigation.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image...

Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access

A sophisticated and highly coordinated cyberattack campaign came to light, as tracked by Guardz...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image...