Summary: Security researchers at Bishop Fox have detailed the exploitation of the CVE-2024-53704 vulnerability in the SonicOS SSLVPN application, enabling remote attackers to bypass authentication and hijack active SSL VPN sessions. SonicWall has urged users to upgrade their firewall firmware to mitigate this critical flaw. The researchers have confirmed the vulnerability’s potential for exploitation and demonstrated a proof-of-concept attack.
Affected: SonicWall SSLVPN application
Keypoints :
- SonicWall issued a warning about a high exploitation risk for CVE-2024-53704 on January 7, advising immediate firmware updates.
- The vulnerability allows attackers to hijack active SSL VPN sessions without proper authentication, leading to unauthorized network access.
- With 4,500 internet-exposed SonicWall SSL VPN servers still unpatched, the exploitation risk has risen significantly, necessitating urgent action from administrators.