<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2024-12802 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2024-12802/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 21:19:58 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2024-12802/feed.xml" rel="self" type="application/rss+xml"/><item><title>SonicWall Gen6 SSL-VPN MFA Bypass via CVE-2024-12802</title><link>https://feed.craftedsignal.io/briefs/2026-05-sonicwall-mfa-bypass/</link><pubDate>Wed, 20 May 2026 21:19:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sonicwall-mfa-bypass/</guid><description>Threat actors exploited CVE-2024-12802, a vulnerability in SonicWall Gen6 SSL-VPN appliances, to bypass multi-factor authentication (MFA) after brute-forcing VPN credentials, leading to the deployment of ransomware-related tools.</description><content:encoded><![CDATA[<p>In February and March 2026, ReliaQuest researchers responded to multiple intrusions exploiting CVE-2024-12802 on SonicWall Gen6 SSL-VPN appliances. The vulnerability allows attackers to bypass MFA by exploiting a missing enforcement for the UPN login format. Organizations that applied the firmware update without completing the manual LDAP reconfiguration remained vulnerable. The attacker&rsquo;s dwell time within the network ranged from 30 to 60 minutes, during which they conducted network reconnaissance and tested credential reuse before logging out, suggesting initial access brokering activity. This activity was seen &ldquo;across multiple sectors and geographies&rdquo;. Gen7 and Gen8 devices are not vulnerable if updated to a newer firmware version. Gen6 devices reached end-of-life on April 16, 2026, and no longer receive security updates.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker brute-forces VPN credentials for SonicWall Gen6 SSL-VPN appliances.</li>
<li>Attacker exploits CVE-2024-12802 due to incomplete patching (firmware update applied but LDAP configuration not updated).</li>
<li>Attacker successfully authenticates to the VPN, bypassing MFA.</li>
<li>Attacker conducts network reconnaissance to map out the internal network.</li>
<li>Attacker tests credential reuse on internal systems.</li>
<li>Attacker establishes a remote connection over RDP using a shared local administrator password to a domain-joined file server.</li>
<li>Attacker attempts to deploy a Cobalt Strike beacon for command-and-control (C2).</li>
<li>Attacker attempts to load a vulnerable driver, likely to disable endpoint protection using BYOVD techniques; EDR blocks the beacon and driver.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The exploitation of CVE-2024-12802 allowed threat actors to gain unauthorized access to internal networks through SonicWall SSL-VPN appliances. In one instance, the attacker reached a domain-joined file server within 30 minutes of initial access. The compromised access can be sold to ransomware groups for further exploitation, leading to data theft, encryption, and financial losses. This vulnerability impacted organizations across multiple sectors and geographies, with rogue login attempts appearing as normal MFA flows in logs, masking the bypass.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the manual remediation steps for CVE-2024-12802 on SonicWall Gen6 devices: delete the existing LDAP configuration, remove locally cached LDAP users, remove the SSL VPN User Domain, reboot the firewall, recreate the LDAP configuration, and create a fresh backup (reference CVE-2024-12802).</li>
<li>Upgrade to actively supported SonicWall appliances (Gen7 or Gen8) to fully mitigate the risk from CVE-2024-12802 if possible, since Gen6 devices are EOL.</li>
<li>Monitor VPN logs for <code>sess=&quot;CLI&quot;</code> activity, which indicates scripted or automated VPN authentication, a key indicator of CVE-2024-12802 exploitation.</li>
<li>Monitor VPN logs for event IDs 238 and 1080, which are strong signals of potential exploitation activity.</li>
<li>Implement detection rules to identify VPN logins from suspicious VPS/VPN infrastructure (see rules below).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>vpn</category><category>mfa-bypass</category><category>cve-2024-12802</category><category>sonicwall</category><category>initial access</category></item></channel></rss>