MFA Bypass Vulnerability in SonicWALL SSL-VPN Affecting Microsoft Active Directory Integration
CVE-2024-12802
Key Information:
Badges
What is CVE-2024-12802?
A vulnerability in SonicWALL’s SSL-VPN could allow attackers to bypass Multi-Factor Authentication (MFA) by exploiting inconsistencies in how User Principal Names (UPN) and Security Account Manager (SAM) account names are handled during integration with Microsoft Active Directory. This separation enables attackers to configure MFA independently for different login methods, creating a potential pathway for unauthorized access.
Affected Version(s)
SonicOS Gen6 NSv 6.5.4.4-44v-21-2457 and older versions
SonicOS Gen6 NSv 6.5.4.15-117n and older versions
SonicOS Gen6 NSv 7.0.1-5161 and older versions
News Articles
Hackers bypass SonicWall VPN MFA due to incomplete patching
Threat actors brute-forced VPN credentials and bypassed multi-factor authentication (MFA) on SonicWall Gen6 SSL-VPN appliances to deploy tools used in ransomware attacks.
19 hours ago
References
CVSS V3.1
Timeline
- 💰
Used in Ransomware
- 👾
Exploit known to exist
- 📰
First article discovered by BleepingComputer
Vulnerability published
Vulnerability Reserved