Security Researcher Darren Martyn Has Revealed The Exploit For SonicWall VPNs


Once a member of the notorious hacktivist movement LulzSec, and now security researcher Darren Martyn (Darren Martyn) published an exploit for a vulnerability in the SonicWall VPN application. 


Martin posted the exploit on his blog on Monday, January 25 - a day after SonicWall reported that attackers had infiltrated its network through a zero-day vulnerability in its own hardware. According to the researcher, he decided to publish an exploit to demonstrate the security issues with SonicWall.


“Given the news that SonicWall has been hacked through zero-day vulnerabilities in its own products, it would be fun to post this,” Martin said.


The researcher wrote the exploit after reading a description of an attack on an offshore bank in 2019 provided by hacker Phineas Fisher. According to Phineas Fisher, in the course of hacking a financial organization, he exploited a zero-day vulnerability in the bank's SonicWall VPN solution. The same vulnerability was used by a hacker in an attack on the Hacking Team in 2015.


After reading the Phineas Fisher post, Martin was able to create his own exploit in just two minutes. According to the researcher, the description of the attack has "everything you need" for this.


According to SonicWall, the vulnerabilities exploited in the attacks were fixed in 2015 with the release of SonicWall SMA 8.0.0.4, and cannot be exploited in SonicWall SMA versions 9 and 10.


The last step in the chain of exploitation of the vulnerability - obtaining administrative privileges in SonicWall VPN, the researcher decided not to publish so that inexperienced hackers could not simply copy the exploit and use it to harm.

Previous Post Next Post