CVE-2024-29012

7.5 HIGH

📋 TL;DR

A stack-based buffer overflow vulnerability in SonicOS HTTP server allows authenticated remote attackers to cause Denial of Service (DoS) by exploiting improper bounds checking in the sscanf function. This affects SonicWall firewall devices running vulnerable SonicOS versions. Attackers with valid authentication credentials can trigger this vulnerability.

💻 Affected Systems

Products:
  • SonicWall firewalls with SonicOS
Versions: Specific versions not detailed in provided references; check SonicWall advisory for exact affected versions
Operating Systems: SonicOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to HTTP management interface; default configurations with web management enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash requiring physical reboot, potential for remote code execution if exploit chains with other vulnerabilities, and extended service disruption.

🟠

Likely Case

Denial of Service causing firewall reboot and network connectivity interruption until system restarts automatically or manually.

🟢

If Mitigated

Minimal impact with proper network segmentation and authentication controls limiting attack surface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access; buffer overflow via sscanf suggests straightforward exploitation once authentication is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SonicWall advisory SNWLID-2024-0008 for specific patched versions

Vendor Advisory: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0008

Restart Required: Yes

Instructions:

1. Log into SonicWall management interface. 2. Navigate to System > Settings > Firmware & Backups. 3. Download latest firmware from SonicWall support portal. 4. Upload and install firmware update. 5. Reboot device after installation completes.

🔧 Temporary Workarounds

Disable HTTP management interface

all

Disable HTTP access to management interface to prevent exploitation via this vector.

Navigate to System > Administration > Management via: HTTPS only

Restrict management access

all

Limit management interface access to trusted IP addresses only.

Navigate to Firewall > Access Rules: Add rule restricting management IPs

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate firewall management interfaces
  • Enforce strong authentication policies and monitor for suspicious login attempts

🔍 How to Verify

Check if Vulnerable:

Check SonicOS version in System > Status > System Summary; compare with SonicWall advisory for affected versions.

Check Version:

Show via CLI: show version

Verify Fix Applied:

Verify firmware version after update matches patched version listed in SonicWall advisory.

📡 Detection & Monitoring

Log Indicators:

  • Multiple authentication failures followed by HTTP requests with malformed parameters
  • System log entries indicating unexpected reboots or crashes

Network Indicators:

  • Unusual HTTP traffic patterns to management interface on port 80/443
  • Traffic spikes from authenticated sources

SIEM Query:

source="sonicwall" AND (event_type="system_reboot" OR http_request CONTAINS "sscanf")

🔗 References

📤 Share & Export