Cyber Crime
Critical Authentication Bypass Vulnerability Hits SonicWall Firewall, Alarming Corporate Customers

SonicWall has issued an urgent alert to its customers regarding a high-severity vulnerability in its SonicOS SSLVPN, which could allow remote attackers to bypass authentication.
The flaw, identified as CVE-2024-53704, poses a significant security risk, particularly for users with SSL VPN or SSH management enabled.
Described as an improper authentication vulnerability in the SSL VPN mechanism, the issue was disclosed in emails to customers and on SonicWall’s official subreddit. The company emphasized the critical need for immediate action to prevent exploitation.
“We have identified a severe firewall vulnerability that could be exploited by attackers. Customers must upgrade to the latest firmware to mitigate this risk,” SonicWall stated.
Nominations for FCRF Excellence Awards in FutureCrime Summit 2025
The vulnerability, with a CVSS score of 8.2/10, affects various Gen6 and Gen7 firewalls. SonicWall has released a firmware update as of January 7, addressing this and other minor vulnerabilities.
To secure their networks, customers should upgrade to the following versions:
- Gen6 Firewalls: SonicOS 6.5.5.1-6n or newer
- NSv Firewalls: SonicOS 6.5.4.v-21s-RC2457 or newer
- Gen7 Firewalls: SonicOS 7.0.1-5165 or newer
SonicWall also advised limiting SSLVPN access to trusted sources or disabling it entirely for internet-facing systems to minimize exposure.
SonicWall’s SSLVPN technology is a cornerstone for enabling secure remote access to internal network resources. However, this vulnerability highlights the critical need for timely updates to safeguard against unauthorized remote access.
As cyber threats evolve, this incident underscores the importance of proactive security measures and prompt patch management to protect critical systems and sensitive data.