MFA Bypass Vulnerability in SonicWALL SSL-VPN Affecting Microsoft Active Directory Integration
CVE-2024-12802
9.1CRITICAL
Summary
A vulnerability in SonicWALL’s SSL-VPN could allow attackers to bypass Multi-Factor Authentication (MFA) by exploiting inconsistencies in how User Principal Names (UPN) and Security Account Manager (SAM) account names are handled during integration with Microsoft Active Directory. This separation enables attackers to configure MFA independently for different login methods, creating a potential pathway for unauthorized access.
Affected Version(s)
SonicOS Gen6 NSv 6.5.4.4-44v-21-2457 and older versions
SonicOS Gen6 NSv 6.5.4.15-117n and older versions
SonicOS Gen6 NSv 7.0.1-5161 and older versions
References
CVSS V3.1
Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved