New NachoVPN attack uses rogue VPN servers to install malicious updates

New NachoVPN attack uses rogue VPN servers to install malicious updates

November 26, 2024 at 05:35PM

Security researchers identified vulnerabilities in Palo Alto and SonicWall VPN clients, allowing attackers to exploit unpatched systems via rogue VPN servers. The “NachoVPN” tool simulates these attacks. Patches have been released, and AmberWolf provided advisories with mitigation recommendations to protect networks from these risks.

### Meeting Takeaways: NachoVPN Vulnerabilities

1. **Vulnerability Overview**:
– A set of vulnerabilities known as “NachoVPN” allows attackers to exploit unpatched versions of Palo Alto Networks and SonicWall SSL-VPN clients.
– Attackers can use rogue VPN servers to initiate malicious updates when clients connect to them.

2. **Methods of Attack**:
– Threat actors can deceive users into connecting their VPN clients to malicious servers through social engineering or phishing tactics, often via malicious websites or documents.
– Exploitable actions include stealing login credentials, executing arbitrary code, installing malicious software, and conducting man-in-the-middle attacks with root certificate installation.

3. **Patch Status**:
– **SonicWall**: Patches for the CVE-2024-29014 vulnerability were released in July. Customers must update to NetExtender Windows 10.2.341 or higher.
– **Palo Alto Networks**: Security updates for the CVE-2024-5921 vulnerability were released recently, with prior notification of the flaw occurring in April. Running the VPN client in FIPS-CC mode can mitigate attacks, along with updating to GlobalProtect 6.2.6 or later.

4. **New Tool Release**:
– AmberWolf has disclosed an open-source tool called NachoVPN, which simulates rogue VPN servers to demonstrate the vulnerabilities.
– The tool is platform-agnostic and can adapt based on the specific VPN client. It supports several corporate VPN products (e.g., Cisco AnyConnect, SonicWall NetExtender, Palo Alto GlobalProtect, Ivanti Connect Secure).
– The tool encourages community contributions for the addition of new vulnerabilities.

5. **Additional Resources**:
– AmberWolf released advisories containing technical details about the vulnerabilities, the attack vectors, and recommendations for network defense to mitigate these risks.

These takeaways provide a comprehensive overview of the vulnerabilities, their exploitation, the status of patches, and resources available for improving defense mechanisms against potential attacks.

Full Article