Cyber Posture

CVE-2024-53705

High

Published: 09 January 2025

Published
09 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0014 34.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

A Server-Side Request Forgery vulnerability in the SonicOS SSH management interface allows a remote attacker to establish a TCP connection to an IP address on any port when the user is logged in to the firewall.

Security Summary

CVE-2024-53705 is a Server-Side Request Forgery (SSRF) vulnerability, classified under CWE-918, in the SonicOS SSH management interface. It affects SonicWall firewalls running SonicOS, enabling a remote attacker to establish a TCP connection to any IP address on any port when a user is logged in to the firewall's management interface. The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), indicating high integrity impact with no requirements for privileges or user interaction.

A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity once a legitimate user is authenticated to the SSH management interface. Successful exploitation allows the attacker to forge server-side requests, forging TCP connections to internal or external hosts and ports, potentially enabling network scanning, bypassing firewall rules, or accessing services not directly exposed.

SonicWall has published a detailed advisory on the vulnerability at https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003, which security practitioners should consult for patch availability and mitigation guidance.

Details

CWE(s)
CWE-918

References