First published: Thu Jan 09 2025(Updated: )
SSL-VPN MFA Bypass in SonicWALL SSL-VPN can arise in specific cases due to the separate handling of UPN (User Principal Name) and SAM (Security Account Manager) account names when integrated with Microsoft Active Directory, allowing MFA to be configured independently for each login method and potentially enabling attackers to bypass MFA by exploiting the alternative account name.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall SSL VPN | ||
Microsoft Active Directory |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12802 is rated as a high-severity vulnerability due to the potential for unauthorized access through MFA bypass.
To fix CVE-2024-12802, ensure that your SonicWALL SSL-VPN is updated to the latest firmware that addresses this vulnerability.
CVE-2024-12802 affects SonicWALL SSL-VPN when integrated with Microsoft Active Directory.
CVE-2024-12802 allows attackers to bypass multi-factor authentication by exploiting differences in handling UPN and SAM account names.
While there is no direct evidence of active exploitation for CVE-2024-12802, it remains a significant risk and should be mitigated promptly.