SonicWall SonicOS SSLVPN Authentication Bypass

critical Web App Scanning Plugin ID 114652

Synopsis

SonicWall SonicOS SSLVPN Authentication Bypass

Description

SonicWall SonicOS SSLVPN versions 7.1.1-7040 prior to 7.1.3-7015 and version 7.1.2-7019 are vulnerable to authentication bypass via a specially forged request that allows to hijack active SSL VPN sessions and gain unauthorized network access.

Solution

Upgrade to SonicWall SonicOS SSLVPN version 7.1.3-7015 or 8.0.0-8037 or latest.

See Also

https://bishopfox.com/blog/sonicwall-cve-2024-53704-ssl-vpn-session-hijacking

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003

Plugin Details

Severity: Critical

ID: 114652

Type: remote

Published: 3/11/2025

Updated: 3/11/2025

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Critical

Score: 9.0

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2024-53704

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2024-53704

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/7/2025

Vulnerability Publication Date: 1/7/2025

CISA Known Exploited Vulnerability Due Dates: 3/11/2025

Reference Information

CVE: CVE-2024-53704