February 21 Advisory: SonicOS SSLVPN Vulnerability Added to CISA KEV [CVE-2024-53704]
Date of Disclosure (source): January 7, 2025
Date Reported as Actively Exploited (source): February 18, 2025
CVE-2024-53704 is a critical vulnerability affecting SonicWall TZ, NSa, NSsp series firewalls and NSv series virtual firewalls, with CVSS scores ranging from 8.2 (assigned by CISA) to 9.8 (assigned by NVD). A complete breakdown of the affected models and versions is available in the table below and in SonicWall’s security advisory.
If successfully exploited, CVE-2024-53704 allows a remote attacker to bypass authentication due to a flaw in the SSLVPN authentication mechanism of select SonicWall firewall models.
Thanks to researchers from Bishop Fox, the flaw was identified in the improper handling of base64-encoded session cookies in the authentication mechanism. Specifically, the getSslvpnSessionFromCookie function fails to properly verify session cookies, allowing attackers to hijack active sessions without credentials.
This vulnerability is known to be actively exploited, and was added to CISA KEV on February 18, 2025.
Field | Details | |||||
---|---|---|---|---|---|---|
CVE-ID | CVE-2024-53704 – CVSS 9.8 (critical) – assigned by NVD | |||||
Vulnerability Description | An authentication bypass vulnerability in the SSL VPN authentication mechanism of select SonicWall firewall models. The flaw stems from improper handling of Base64-encoded session cookies in the getSslvpnSessionFromCookie function, which fails to properly verify session cookies. This allows a remote attacker to hijack active SSL VPN sessions without credentials. | |||||
Date of Disclosure | January 7, 2025 | |||||
Affected Assets | The getSsLvpnSessionFromCookie function of the SSLVPN authentication mechanism in various SonicWall TZ/NSa/NSsp/NSv series firewalls. | |||||
Vulnerable Software Versions |
|
|||||
PoC Available? | A detailed writeup of the vulnerability by researchers from Bishop Fox is available here. Additionally, there are multiple PoC exploit code snippets available on GitHub. | |||||
Exploitation Status | This vulnerability is known to be actively exploited and was added to CISA KEV on February 18, 2025. | |||||
Patch Status | This vulnerability has been patched, and SonicWall’s advisory includes a table listing the fixed platforms and their patched versions. |
Censys Perspective
At the time of writing, Censys observed 5,065 exposed instances of a TZ, NSa, NSsp, or NSv series firewall. Of these 5,065 instances, 462 exposed both a vulnerable model number and a vulnerable version.
Map of Exposed Vulnerable Sonicwall TZ/NSa/NSsp/NSv Series Firewalls:
services.software: (vendor="SonicWall" and product:{"TZ","NSa","NSsp","NSv"}) and not labels: {tarpit, honeypot}
host.services.software: (vendor="SonicWall" and product:{"TZ","NSa","NSsp","NSv"}) and not host.labels: {tarpit, honeypot}
host.services.hardware: (vendor:"SonicWall" and product:{"TZ","NSa","NSsp","NSv"}) and not host.labels.value: {"TARPIT", "HONEYPOT"}