MFA Bypass Vulnerability in SonicWALL SSL-VPN Affecting Microsoft Active Directory Integration
CVE-2024-12802

9.1CRITICAL

Key Information:

Vendor

Sonicwall

Status
Vendor
CVE Published:
9 January 2025

Badges

💰 Ransomware👾 Exploit Exists📰 News Worthy

What is CVE-2024-12802?

A vulnerability in SonicWALL’s SSL-VPN could allow attackers to bypass Multi-Factor Authentication (MFA) by exploiting inconsistencies in how User Principal Names (UPN) and Security Account Manager (SAM) account names are handled during integration with Microsoft Active Directory. This separation enables attackers to configure MFA independently for different login methods, creating a potential pathway for unauthorized access.

Affected Version(s)

SonicOS Gen6 NSv 6.5.4.4-44v-21-2457 and older versions

SonicOS Gen6 NSv 6.5.4.15-117n and older versions

SonicOS Gen6 NSv 7.0.1-5161 and older versions

News Articles

Hackers bypass SonicWall VPN MFA due to incomplete patching

Threat actors brute-forced VPN credentials and bypassed multi-factor authentication (MFA) on SonicWall Gen6 SSL-VPN appliances to deploy tools used in ransomware attacks.

19 hours ago

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 💰

    Used in Ransomware

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by BleepingComputer

  • Vulnerability published

  • Vulnerability Reserved

.