CVE-2023-5970

8.8 HIGH

πŸ“‹ TL;DR

This vulnerability allows a remote authenticated attacker to bypass multi-factor authentication (MFA) on SonicWall SMA100 SSL-VPN virtual office portals by creating duplicate external domain users using accent characters. Organizations using affected SonicWall SMA100 devices with external domain authentication and MFA enabled are at risk.

πŸ’» Affected Systems

Products:
  • SonicWall SMA100 Series
Versions: All versions prior to 12.4.4-10179
Operating Systems: SonicOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires external domain authentication with MFA enabled. Internal authentication methods are not affected.

πŸ“¦ What is this software?

⚠️ Risk & Real-World Impact

πŸ”΄

Worst Case

Attackers gain unauthorized access to VPN-protected internal networks, potentially leading to data exfiltration, lateral movement, and full network compromise.

🟠

Likely Case

Attackers bypass MFA to access VPN resources as legitimate users, enabling credential theft, privilege escalation, and unauthorized data access.

🟒

If Mitigated

With proper patching and monitoring, impact is limited to attempted but unsuccessful authentication bypass attempts.

🌐 Internet-Facing: HIGH
🏒 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: βœ… No
Weaponized: LIKELY
Unauthenticated Exploit: βœ… No
Complexity: LOW

Exploitation requires authenticated access to the VPN portal. Attackers can leverage existing compromised credentials or social engineering.

πŸ› οΈ Fix & Mitigation

βœ… Official Fix

Patch Version: 12.4.4-10179 or later

Vendor Advisory: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0018

Restart Required: Yes

Instructions:

1. Download firmware 12.4.4-10179 or later from MySonicWall. 2. Backup current configuration. 3. Upload and install firmware via SMA100 web interface. 4. Reboot device after installation.

πŸ”§ Temporary Workarounds

Disable External Domain Authentication

all

Temporarily switch to local authentication or RADIUS/LDAP without external domain integration.

Enforce Strict Username Policies

all

Configure domain policies to reject usernames with accent characters or special symbols.

🧯 If You Can't Patch

  • Implement network segmentation to isolate VPN traffic and limit lateral movement.
  • Enable detailed authentication logging and monitor for duplicate user creation attempts.

πŸ” How to Verify

Check if Vulnerable:

Check SMA100 firmware version via web interface: System > Status > Firmware Version. If version is below 12.4.4-10179, device is vulnerable.

Check Version:

ssh admin@<sma_ip> show version

Verify Fix Applied:

After patching, verify firmware version is 12.4.4-10179 or higher. Test MFA functionality with external domain users containing accent characters.

πŸ“‘ Detection & Monitoring

Log Indicators:

  • Multiple authentication attempts with similar usernames differing by accent characters
  • Successful logins from users with accent characters after MFA bypass

Network Indicators:

  • Unusual VPN connection patterns from external IPs
  • Increased authentication traffic to SMA100 portal

SIEM Query:

source="sma100" AND (event_type="authentication" AND (user="*[Ñéíóú]*" OR user="*[àèìòù]*"))

πŸ”— References

πŸ“€ Share & Export