SonicWall VPN Vulnerability Exploited by Hackers Despite MFA
Hackers bypass SonicWall VPN MFA due to incomplete patching

Image: Bleepingcomputer
Hackers have exploited a vulnerability (CVE-2024-12802) in SonicWall Gen6 SSL-VPN appliances, allowing them to bypass multi-factor authentication (MFA) and gain unauthorized access to networks. SonicWall has issued a warning that simply updating firmware is insufficient; manual reconfiguration is also necessary to fully mitigate the risk.
- 01Hackers took between 30 to 60 minutes to breach networks and conduct reconnaissance.
- 02SonicWall's advisory states that Gen6 devices require manual LDAP server reconfiguration after firmware updates to prevent MFA bypass.
- 03ReliaQuest identified this as the first known exploitation of CVE-2024-12802 in the wild, affecting multiple sectors.
- 04The attackers attempted to deploy a Cobalt Strike beacon but were thwarted by endpoint protection measures.
- 05Gen6 SonicWall devices have reached end-of-life and no longer receive security updates, prompting a recommendation for users to upgrade.
Advertisement
In-Article Ad
Cybersecurity researchers have identified a significant vulnerability in SonicWall Gen6 SSL-VPN appliances, designated as CVE-2024-12802, which allows attackers to bypass multi-factor authentication (MFA) using brute-force methods. The hackers exploited this vulnerability to gain access to internal networks within 30 to 60 minutes, conducting reconnaissance and testing credential reuse on internal systems. SonicWall has cautioned that merely installing the latest firmware is not enough; manual reconfiguration of the LDAP server is critical to fully mitigate the risk. This vulnerability was first observed in the wild by ReliaQuest, which noted that affected devices appeared to be patched but remained vulnerable due to incomplete remediation steps. In one incident, attackers managed to establish a remote connection and attempted to deploy malicious tools, although their efforts were blocked by existing endpoint protection. Given that Gen6 devices have reached their end-of-life and no longer receive security updates, users are advised to transition to newer models to ensure ongoing security.
Advertisement
In-Article Ad
Organizations using SonicWall Gen6 devices may face increased risk of unauthorized access and ransomware attacks if they do not properly configure their systems.
Advertisement
In-Article Ad
Reader Poll
How concerned are you about vulnerabilities in VPN services?
Connecting to poll...
Read the original article
Visit the source for the complete story.




