Home SonicWALL CVE-2024-12802
Back to SonicWALL

CVE-2024-12802

SonicWALL SSL-VPN

SonicWALL CVSS 9.1 Updated March 15, 2026

Executive Risk Summary

"A vulnerability in SonicWALL SSL-VPN allows attackers to bypass multi-factor authentication (MFA) by exploiting the separate handling of User Principal Name (UPN) and Security Account Manager (SAM) account names when integrated with Microsoft Active Directory. This could potentially enable unauthorized access to the VPN, compromising the security of the network."

Operational Audit Arsenal

Target Type Service
Target Asset SonicWALL SSL-VPN
Standard Path %programfiles%SonicWALLSSL-VPN
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: SonicWALL SSL-VPN (Service)
$Targets = 'SonicWALL SSL-VPN'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Likely

VPN service

Internal Work Notes

CVE-2024-12802: SonicWALL SSL-VPN MFA bypass vulnerability - apply patch from https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0001 to prevent unauthorized access

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.