Saturday, April 12, 2025
HomeCVE/vulnerabilitySonicWall Firewall Vulnerability Enables Unauthorized Access

SonicWall Firewall Vulnerability Enables Unauthorized Access

Published on

SIEM as a Service

Follow Us on Google News

Researchers from Bishop Fox have successfully exploited CVE-2024-53704, an authentication bypass vulnerability that affects SonicWall firewalls.

This critical flaw allows remote attackers to hijack active SSL VPN sessions, enabling unauthorized network access without requiring user credentials.

If left unpatched, the vulnerability poses significant risks to organizations relying on SonicWall devices for their network security.

- Advertisement - Google News

CVE-2024-53704: The Threat Explained

The vulnerability, disclosed by SonicWall on January 7, 2025, targets the SSL VPN component of their firewalls.

According to findings shared by Jon Williams, a security researcher at Bishop Fox, the exploit is relatively simple to execute despite the complex reverse engineering required to uncover the flaw.

Once exploited, it permits an attacker to take over an active VPN session as long as at least one user is connected.

This session hijacking capability is far-reaching. Exploiting the flaw enables attackers to:

  • Identify the compromised user.
  • Retrieve configuration files from NetExtender.
  • Access private network routes reachable by the victim.
  • Initiate VPN tunnel connections—all without needing the victim’s password.

Additionally, attackers can log the authorized user out of their session at will. Williams emphasized the opportunistic nature of the vulnerability, stating, “The attacker doesn’t have to know who they’re targeting—any active session can be hijacked.”

Urgency for Patching

SonicWall issued patches for this vulnerability in January 2025, but thousands of devices remain exposed as organizations delay updates.

Bishop Fox took proactive steps to assist their clients by notifying them about the flaw and demonstrating exploit impacts.

To mitigate the threat, administrators of SonicWall appliances are urged to apply the latest updates immediately.

Delays in patching leave networks open to severe exploitation risks, with attackers potentially gaining access to sensitive internal systems.

Bishop Fox adhered to a responsible disclosure timeline before publicly sharing exploit details. The disclosure process included a waiting period of 90 days after SonicWall’s initial report and 30 days following the patch release.

During this time, researchers withheld critical technical details to allow organizations sufficient time for remediation.

Jon Williams encouraged affected users to take action promptly, stating, “The good news is that patches are available. For SonicWall customers, it’s critical to update all affected devices immediately.”

The exploitation of CVE-2024-53704 serves as a stark reminder of the ongoing risks posed by unpatched vulnerabilities.

For organizations relying on SonicWall firewalls to protect their network perimeter, timely patching is not optional—it’s essential to prevent unauthorized access and potential data breaches.

Cybersecurity teams should prioritize patch management as a cornerstone of defense against evolving threats.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...