声破攻击链:利用漏洞接管SonicWall设备
研究人员发现了一种名为“SonicBoom Attack Chain”的新攻击技术,利用Apache服务器漏洞CVE-2024-38475和命令注入漏洞CVE-2023-44221,绕过身份验证并获取SonicWall Secure Mobile Access设备的管理权限。攻击者可窃取敏感数据、部署恶意软件或进一步攻击内部资源。厂商已发布补丁,建议立即更新并加强安全监控。 2025-5-5 07:53:7 Author: gbhackers.com(查看原文) 阅读量:31 收藏

Cybersecurity researchers have uncovered a dangerous new exploitation technique, dubbed the “SonicBoom Attack Chain,” which allows hackers to bypass authentication and seize administrative control over SonicWall Secure Mobile Access (SMA) appliances.

This attack leverages a combination of recently disclosed vulnerabilities, which have already been spotted in real-world attacks.

The SonicBoom Attack Chain essentially stitches together two severe vulnerabilities:

- Advertisement - Google News

  • CVE-2024-38475: An Apache HTTP Server “Filename Confusion” bug, discovered by Orange Tsai, enabling arbitrary file read before authentication.
  • CVE-2023-44221: A post-authentication command injection flaw, discovered by Wenjie Zhong (H4lo), which can grant remote command execution.
A whole New Attack

In combination, these flaws allow threat actors to first access sensitive system files-such as password and configuration files-using the Apache mod_rewrite flaw, and then leverage the command injection to run arbitrary code with administrative privileges.

How SonicBoom Works

The attack chain exploits intricacies in how the Apache web server processes HTTP requests, specifically abusing the mod_rewrite module’s handling of paths.

Step 1: Arbitrary File Read

The attacker sends a crafted HTTP request to the SMA appliance, exploiting the mod_rewrite vulnerability (CVE-2024-38475).

By inserting a URL-encoded question mark (e.g., %3F) into the request and carefully manipulating the path, the attacker can trick the server into revealing arbitrary files from the filesystem-including potentially sensitive authentication data.

For example, a request like:

GET /portal/../../../../etc/passwd%3F HTTP/1.1

Host: target-sma

may return the contents of the /etc/passwd file, bypassing the intended access controls.

Step 2: Command Injection and Admin Access

After extracting critical information, attackers can use the post-auth command injection vulnerability (CVE-2023-44221) to remotely execute code or escalate privileges.

If configuration or admin credentials were obtained in step one, the system is completely compromised.

Researchers at watchTowr, a threat intelligence firm, demonstrated that these attacks can be performed without any prior authentication, making every unpatched SMA device a susceptible target.

The SonicWave SMA appliance is widely used by organizations globally to secure remote access to critical applications. Its prevalence on network edges makes it a particularly attractive target for cybercriminals.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added both CVEs to its Known Exploited Vulnerabilities (KEV) catalog, warning that “immediate action is required to address ongoing exploitation.”

If successfully compromised, attackers could:

  • Steal sensitive data and credentials
  • Deploy ransomware or malware inside the corporate network
  • Pivot to attack other internal resources

SonicWall has issued urgent advisories and patches for affected SMA versions. Administrators are urged to:

  • Apply the latest updates to SMA appliances immediately
  • Monitor for suspicious activity, including unauthorized logins and file access
  • Check for unusual network traffic originating from SMA devices

Organizations unable to patch immediately are advised to take vulnerable appliances offline until mitigations are in place.

The SonicBoom Attack Chain highlights how chaining together “known” vulnerabilities can have devastating consequences, especially on edge devices. As always, prompt patching and layered defenses are the best mitigation.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.


文章来源: https://gbhackers.com/sonicboom-attack-chain/
如有侵权请联系:admin#unsafe.sh