The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-12802

CVE-2024-12802: SonicWALL SSL-VPN MFA Bypass Vulnerability

CVE-2024-12802 is an MFA bypass flaw in SonicWALL SSL-VPN affecting Active Directory integrations. Attackers can exploit alternative account names to circumvent authentication. This article covers technical details, affected systems, impact, and mitigation strategies.

Published: March 31, 2026

CVE-2024-12802 Overview

CVE-2024-12802 is a critical authentication bypass vulnerability affecting SonicWALL SSL-VPN when integrated with Microsoft Active Directory. The vulnerability arises from the separate handling of User Principal Name (UPN) and Security Account Manager (SAM) account names, which allows Multi-Factor Authentication (MFA) to be configured independently for each login method. Attackers can potentially bypass MFA protections by exploiting the alternative account name format that may not have MFA enforcement applied.

Critical Impact

This vulnerability enables attackers to completely bypass MFA security controls on SonicWALL SSL-VPN, potentially granting unauthorized network access without completing the required second authentication factor.

Affected Products

  • SonicWALL SSL-VPN (when integrated with Microsoft Active Directory)
  • SonicWALL SSL-VPN deployments using UPN and SAM account configurations
  • Environments with inconsistent MFA policies across login methods

Discovery Timeline

  • 2025-01-09 - CVE CVE-2024-12802 published to NVD
  • 2025-01-09 - Last updated in NVD database

Technical Details for CVE-2024-12802

Vulnerability Analysis

This vulnerability is classified under CWE-305 (Authentication Bypass by Primary Weakness), which occurs when an authentication mechanism fails to adequately verify the identity of a user. In the case of CVE-2024-12802, the flaw stems from an architectural weakness in how SonicWALL SSL-VPN handles different Active Directory account name formats.

When organizations integrate SonicWALL SSL-VPN with Microsoft Active Directory, users can authenticate using either their UPN format (e.g., user@domain.com) or their SAM account name format (e.g., DOMAIN\username). The vulnerability exists because these two authentication paths are treated as separate entities within the MFA configuration, allowing administrators to inadvertently—or unknowingly—leave one login method without MFA protection while securing the other.

Root Cause

The root cause of this vulnerability lies in the compartmentalized handling of UPN and SAM account names within SonicWALL's authentication framework. Rather than applying MFA policies uniformly across all valid login formats for a single user identity, the system treats each format independently. This design decision creates a security gap where MFA enforcement on one account name format does not automatically extend to the alternative format, even though both represent the same user account in Active Directory.

Attack Vector

An attacker can exploit this vulnerability through network-based access to the SSL-VPN login portal. The attack requires no prior authentication and no user interaction, making it particularly dangerous for internet-facing VPN deployments.

The attack scenario involves an attacker identifying that MFA is configured for one account format but not the other. By attempting authentication using the unprotected account name format (either UPN or SAM, depending on the configuration), the attacker can successfully authenticate without completing MFA challenges, effectively bypassing this critical security control.

For example, if an organization has configured MFA enforcement for UPN-based logins (user@company.com), an attacker who discovers or guesses valid credentials could attempt login using the SAM format (COMPANY\user) to circumvent the MFA requirement entirely. This attack requires valid credentials but completely negates the protection that MFA is designed to provide against credential compromise.

For detailed technical information, refer to the SonicWall Security Advisory SNWLID-2025-0001.

Detection Methods for CVE-2024-12802

Indicators of Compromise

  • Authentication logs showing successful VPN logins without corresponding MFA challenge completion events
  • Users authenticating via SAM account name format when organizational policy mandates UPN format (or vice versa)
  • Unusual login patterns where the same user account authenticates using different name formats
  • VPN access from unexpected geographic locations or IP addresses without MFA verification
  • Failed MFA attempts on one account format followed by successful authentication on the alternative format

Detection Strategies

  • Configure SIEM rules to correlate VPN authentication events with MFA verification logs, alerting on successful logins lacking MFA completion
  • Monitor for authentication attempts using both UPN and SAM formats for the same user within short time windows
  • Implement behavioral analytics to detect login pattern anomalies, particularly users switching between account name formats
  • Review SSL-VPN authentication logs for discrepancies between login method and expected MFA policy enforcement

Monitoring Recommendations

  • Enable verbose logging on SonicWALL SSL-VPN appliances to capture complete authentication event details including account name format used
  • Deploy network detection tools to monitor SSL-VPN traffic patterns and identify potential unauthorized access attempts
  • Establish baseline authentication patterns for users and alert on deviations, particularly changes in login format preference
  • Regularly audit MFA configuration to ensure both UPN and SAM account formats have consistent policy enforcement

How to Mitigate CVE-2024-12802

Immediate Actions Required

  • Review current MFA configuration on all SonicWALL SSL-VPN appliances to verify MFA is enforced for both UPN and SAM account name formats
  • Audit authentication logs to identify any potential exploitation attempts where MFA was bypassed
  • Apply the latest security patches from SonicWall as referenced in the vendor advisory
  • Consider temporarily restricting SSL-VPN access to a single account name format until consistent MFA enforcement is verified
  • Notify security operations teams to increase monitoring of VPN authentication events

Patch Information

SonicWall has released a security advisory addressing this vulnerability. Organizations should consult the SonicWall Security Advisory SNWLID-2025-0001 for specific patch versions and update instructions. Apply the recommended firmware updates to all affected SonicWALL SSL-VPN appliances immediately to remediate this MFA bypass vulnerability.

Workarounds

  • Enforce a single account name format policy (either UPN or SAM exclusively) at the Active Directory and SSL-VPN configuration level to eliminate the bypass vector
  • Implement network segmentation and conditional access policies to limit VPN access scope even if authentication bypass occurs
  • Configure SSL-VPN to require certificate-based authentication in addition to credentials and MFA
  • Deploy additional access controls such as IP whitelisting or geo-blocking to reduce the attack surface
  • Enable account lockout policies to limit brute-force attempts against either account format
bash
# Review SonicWALL SSL-VPN authentication configuration
# Ensure MFA policies are applied consistently across all login methods
# Consult SonicWall documentation for specific CLI commands based on firmware version
# Example: Verify MFA settings for both UPN and SAM in the management interface
# Settings > Users > Local Users & Groups > Authentication Methods
# Confirm "Require MFA" is enabled for all applicable authentication domains

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechSonicwall

  • SeverityCRITICAL

  • CVSS Score9.1

  • EPSS Probability0.06%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-305
  • Technical References
  • SonicWall Vulnerability Detail SNWLID-2025-0001
  • Related CVEs
  • CVE-2026-3470: SonicWall Email Security Vulnerability

  • CVE-2025-32819: SonicWall SMA 100 Auth Bypass Vulnerability

  • CVE-2023-34124: SonicWall Analytics Auth Bypass Flaw

  • CVE-2022-22282: SonicWall SMA Authentication Bypass Flaw
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English