Back to all lessons
Awareness Lessons
2 days ago

Incomplete Patching Leaves SonicWall VPNs Vulnerable Despite MFA

Organizations patched their SonicWall Gen6 SSL-VPN firmware to address CVE-2024-12802 but failed to complete the required manual LDAP remediation steps, allowing attackers to bypass multi-factor authentication. This incomplete patching process created a false sense of security, as administrators believed they were protected while critical vulnerabilities remained exploitable. The incident demonstrates that security patches often require multiple steps beyond just firmware updates, and incomplete remediation can be as dangerous as no patching at all. Threat actors leveraged this gap to gain initial network access and deploy ransomware across multiple organizations.

Tactical Insight

Immediate actions

  • Verify all SonicWall Gen6 devices have completed both firmware updates and manual LDAP remediation steps
  • Conduct authentication testing to confirm MFA cannot be bypassed
  • Review patch documentation thoroughly to identify all required remediation steps

Long-term improvements

  • Establish patch validation procedures that verify complete remediation before marking vulnerabilities as resolved
  • Implement automated testing to confirm security controls function properly after patching
  • Create detailed checklists for complex patches that require multiple remediation steps

Detection measures

  • Monitor VPN authentication logs for unusual patterns or bypass attempts
  • Set up alerts for successful authentications that lack proper MFA validation