14/68 Friday, January 10, 2025
SonicWall has urged its customers to promptly upgrade the SonicOS firmware of their firewalls to mitigate an authentication bypass vulnerability identified as CVE-2024-53704, with a CVSS score of 8.2. This vulnerability affects the SSL VPN and SSH management features, posing a significant risk to users who have enabled these features. To address and prevent exploitation, SonicWall recommends upgrading to the following firmware versions:
- Gen 6 / 6.5 hardware firewalls: SonicOS 6.5.5.1-6n or later
- Gen 6 / 6.5 NSv firewalls: SonicOS 6.5.4.v-21s-RC2457 or later
- Gen 7 firewalls: SonicOS 7.0.1-5165 or later, 7.1.3-7015 or higher
- TZ80: SonicOS 8.0.0-8037 or later
In addition to firmware updates, SonicWall has provided further guidance to minimize risk:
- Restrict SSL VPN access to trusted sources only or disable internet-based access entirely.
- For SSH management, limit access to trusted sources or disable SSH management over the internet.
SonicWall emphasized the importance of immediate action to reduce risk and prevent exploitation of the vulnerability. Customers can refer to detailed instructions for disabling SSL VPN access at https://www.sonicwall.com/support/knowledge-base/how-can-i-setup-ssl-vpn/170505609285133
Source https://securityaffairs.com/172823/security/sonicwall-sonicos-authentication-bypass-flaw.html