Wednesday , February 12 2025
Bishop Fox

Patch Now
SonicWall firewall vuln allows hackers to hijack VPN sessions

Bishop Fox security researchers have released detailed information on the CVE-2024-53704 vulnerability, which lets attackers bypass authentication in some versions of the SonicOS SSLVPN application.

On January 7, the vendor warned about the risk of exploitation of a flaw and advised administrators to upgrade their SonicOS firewalls’ firmware to fix it.

Microsoft 2025 February Patch Tuesday fixes 2 zero-days, 55 flaws

Microsoft's February 2025 Patch Tuesday includes security updates for 55 vulnerabilities, including four zero-days, two of which are currently being...
Read More
Microsoft 2025  February Patch Tuesday fixes 2 zero-days, 55 flaws

Patch Now
SonicWall firewall vuln allows hackers to hijack VPN sessions

Bishop Fox security researchers have released detailed information on the CVE-2024-53704 vulnerability, which lets attackers bypass authentication in some versions...
Read More
Patch Now  SonicWall firewall vuln allows hackers to hijack VPN sessions

SAP Security Patch February 2025: Multi Vulns Addressed

SAP has issued new security patches for 19 vulnerabilities and updated 2 previous Security Notes. This Patch Day features fixes...
Read More
SAP Security Patch February 2025: Multi Vulns Addressed

TRACKING RANSOMWARE
Akira Topped January 2025 as the Most Active Ransomware Threat

In January 2025, there were 510 global ransomware incidents, with Akira as the leading group and new ones like MORPHEUS...
Read More
TRACKING RANSOMWARE  Akira Topped January 2025 as the Most Active Ransomware Threat

FinStealer Malware Targets Indian Bank’s Mobile Users, Stealing Credentials

CYFIRMA analysis reveals a sophisticated malware campaign that exploits a major Indian bank's brand through fake mobile apps. These apps,...
Read More
FinStealer Malware Targets Indian Bank’s Mobile Users, Stealing Credentials

CVE-2024-52875
Over 12,000 Firewall Vulnerable to 1-Click RCE Exploit

Over 1,200 firewall instances are vulnerable to a critical remote code execution issue, known as CVE-2024-52875. The vulnerability is found...
Read More
CVE-2024-52875  Over 12,000 Firewall Vulnerable to 1-Click RCE Exploit

CVE-2025-24200
Apple releases update of zero-day vuln exploited in the Wild

Apple has issued emergency security updates to fix a zero-day vulnerability, CVE-2025-24200, which is being exploited in targeted attacks on...
Read More
CVE-2025-24200  Apple releases update of zero-day vuln exploited in the Wild

Zimbra Releases Updates for SQL Injection, XSS, and SSRF Vulns

Zimbra has released updates for its Collaboration software to fix critical security flaws that could lead to information disclosure if...
Read More
Zimbra Releases Updates for SQL Injection, XSS, and SSRF Vulns

CVE-2025-23369
SAML Bypass Auth on GitHub Enterprise Servers to Login

A serious security vulnerability, CVE-2025-23369, has been found in GitHub Enterprise Server (GHES) that lets attackers bypass SAML authentication and...
Read More
CVE-2025-23369  SAML Bypass Auth on GitHub Enterprise Servers to Login

India to launch new domain name for banks to combat digital fraud

India's central bank to launch a special “.bank.in” domain for banks in April 2025 to fight digital payment fraud and...
Read More
India to launch new domain name for banks to combat digital fraud

“We have identified a firewall vulnerability that is susceptible to actual exploitation for customers with SSL VPN or SSH management enabled, and that should be mitigated immediately by upgrading to the latest firmware,” warned SonicWall in an email sent to customers at the time.

The flaw lets a remote attacker take over active SSL VPN sessions without authentication, giving them unauthorized access to the victim’s network.

On January 22, Bishop Fox researchers announced they created an exploit for CVE-2024-53704 after extensive reverse engineering, reaffirming SonicWall’s concerns about the vulnerability’s risk.

Bishop Fox released the full exploitation details on Monday after giving system administrators time to apply the patches.

The exploit sends a manipulated session cookie with a base64-encoded string of null bytes to the SSL VPN authentication endpoint at ‘/cgi-bin/sslvpnclient.’

This wrongly validates the session, as it assumes the request is linked to an active VPN session.

This logs out the user and gives the attacker access to their session, allowing them to read bookmarks, get VPN settings, open a VPN tunnel, and access private network resources.

The researchers tested their analysis by creating a proof-of-concept exploit code to simulate an authentication bypass attack, successfully hijacking an active session as indicated by the response headers.

The issue affects SonicOS versions 7.1.x (up to 7.1.1-7058), 7.1.2-7019, and 8.0.0-8035, used in Gen 6 and Gen 7 firewalls and SOHO series devices.

Fixes are available in SonicOS 8.0.0-8037 and later, 7.0.1-5165 and higher, 7.1.3-7015 and higher, and 6.5.5.1-6n and higher. For model-specific details, refer to SonicWall’s bulletin.

Check Also

OPA Gatekeeper

OPA Gatekeeper Bypass Unveils Risks in Kubernetes Policy Engines

A recent Aqua Security report highlights major security risks in Kubernetes policy enforcement, especially with …

Leave a Reply

Your email address will not be published. Required fields are marked *