BOOK THIS SPACE FOR AD
ARTICLE ADis urging its customers to upgrade their SonicOS firmware to address a critical authentication bypass vulnerability affecting SSL VPN and SSH management. This vulnerability, identified as CVE-2024–53704, has a high severity score of 8.2 (CVSS v3.0), making it susceptible to exploitation.
In a recent email sent to SonicWall customers and shared on Reddit, the company emphasizes that patches for this flaw are available as of yesterday, and all affected users must install them immediately to prevent potential exploitation.
Key Recommendations:
Upgrade to the latest SonicOS firmware:Gen 6 / 6.5 hardwarefirewalls: SonicOS 6.5.5.1–6n or newerGen 6 / 6.5 NSvfirewalls: SonicOS 6.5.4.v-21s-RC2457 or newerGen 7firewalls: SonicOS 7.0.1–5165 or newer; 7.1.3–7015HigherTZ80: SonicOS 8.0.0–8037 or newerAdditionally, SonicWall addresses three other critical vulnerabilities in the same bulletin:
CVE-2024–40762: A cryptographically weak PRNG in the SSL…