CVE-2024-53705
Published: 09 January 2025
Description
A Server-Side Request Forgery vulnerability in the SonicOS SSH management interface allows a remote attacker to establish a TCP connection to an IP address on any port when the user is logged in to the firewall.
Security Summary
CVE-2024-53705 is a Server-Side Request Forgery (SSRF) vulnerability, classified under CWE-918, in the SonicOS SSH management interface. It affects SonicWall firewalls running SonicOS, enabling a remote attacker to establish a TCP connection to any IP address on any port when a user is logged in to the firewall's management interface. The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), indicating high integrity impact with no requirements for privileges or user interaction.
A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity once a legitimate user is authenticated to the SSH management interface. Successful exploitation allows the attacker to forge server-side requests, forging TCP connections to internal or external hosts and ports, potentially enabling network scanning, bypassing firewall rules, or accessing services not directly exposed.
SonicWall has published a detailed advisory on the vulnerability at https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003, which security practitioners should consult for patch availability and mitigation guidance.
Details
- CWE(s)