Menace actors deployed instruments utilized in ransomware assaults to brute pressure VPN credentials on SonicWall Gen6 SSL-VPN home equipment, bypassing multi-factor authentication (MFA).
In the course of the breach, the hackers took 30 to 60 minutes to log in, carry out community reconnaissance, take a look at credential reuse on inner programs, and sign off.
SonicWall warned in its safety advisory for CVE-2024-12802 that putting in the firmware replace alone on Gen6 units doesn’t absolutely mitigate the vulnerability and requires handbook reconfiguration of the LDAP server. In any other case, MFA safety stays weak to being bypassed.
Researchers at cybersecurity agency ReliaQuest responded to a number of intrusions between February and March and rated with “medium confidence that is seemingly the primary open subject exploitation of CVE-2024-12802 focusing on SonicWall units throughout a number of environments.”
The researchers famous that within the environments they studied, units gave the impression to be patched as a result of they had been operating up to date firmware, however remained weak as a result of the required remediation steps weren’t accomplished.
Gen7 and Gen8 units can fully remove the chance of exploiting CVE-2024-12802 by merely updating to a brand new firmware model.
exploitation actions
In line with ReliaQuest, in a single incident, a hacker gained entry to its inner community and reached a domain-joined file server inside simply half-hour. I then established a distant connection through RDP utilizing the shared native administrator password.
Researchers discovered that attackers tried to deploy Cobalt Strike beacons, a post-exploitation framework for command-and-control (C2) communications, and weak drivers that had been prone to disable endpoint safety utilizing Deliver Your Personal Susceptible Driver (BYOVD) methods.
Nevertheless, the put in Endpoint Detection and Response (EDR) resolution blocked the beacon and driver from loading.
.jpg)
Supply: LiliaQuest
Based mostly on intentional logout actions and logging again in a number of days later, generally utilizing a unique account, researchers imagine the attackers are brokers promoting preliminary entry to menace teams.
Final yr, the Akira ransomware group focused SonicWall SSL VPN units and logged in even when accounts had MFA enabled, however their techniques weren’t noticed.
Addressing CVE-2024-12802
CVE-2024-12802 The vulnerability is brought on by a scarcity of MFA enforcement within the UPN login format, permitting an attacker with legitimate credentials to authenticate instantly and bypass the MFA requirement.
Gen6 SonicWall units should be up to date with the most recent firmware after which observe the restore steps detailed within the vendor advisory.
- Delete the present LDAP configuration utilizing userPrincipalName within the Certified Login Title subject.
- Delete domestically cached/listed LDAP customers
- Delete the configured SSL VPN “consumer area” (return to LocalDomain).
- restart the firewall
- Re-create the LDAP configuration the place the “Certified Login Title” doesn’t embrace userPrincipalName.
- Create a brand new backup to keep away from restoring a weak LDAP configuration later.
Researchers imagine the attackers behind the analyzed intrusions gained preliminary entry by exploiting the CVE-2024-12802 vulnerability “throughout a number of sectors and geographies.”
In line with ReliaQuest, the fraudulent login makes an attempt noticed within the incidents investigated had been nonetheless logged as regular MFA flows, main defenders to imagine that MFA was working even when it failed.
Researchers say the sess=”CLI” sign is a key indicator of those assaults, suggesting scripted or automated VPN authentication, and recommends directors search for it.
Different sturdy indicators embrace occasion IDs 238 and 1080, and VPN logins from suspicious VPS/VPN infrastructure.
On condition that Gen6 SSL-VPN home equipment reached finish of assist on April 16 of this yr and not obtain safety updates, it’s usually beneficial emigrate to a more recent, actively supported model.

Automated penetration testing instruments provide actual worth, however they had been constructed to reply one query: Can an attacker get by your community? They aren’t constructed to check whether or not controls block threats, detection guidelines fireplace, or cloud configurations are preserved.
This information describes six surfaces that it’s best to truly look at.
Obtain now
