Tech News
NachoVPN Attack Risks Risks Corporate VPN Clients

Researchers have discovered a new attack strategy that allows malicious updates to be installed on target systems. Known as “NachoVPN,” this attack specifically targets corporate clients like Palo Alto and SonicWall SSL-VPN clients by exploiting unpatched vulnerabilities.
NachoVPN Attack Enables Malicious Updates
A new attack technique, called NachoVPN, has been demonstrated by researchers from Amberwolf targeting corporate VPN clients. This attack allows threat actors to deceive corporate VPN clients into connecting to rogue endpoints, ultimately enabling them to carry out various malicious activities, including stealing login credentials from the targeted systems.
The attack is effective against most corporate VPN clients, which the researchers have labeled as “Very Pwnable Networks.” In their research, SonicWall NetExtender and Palo Alto Networks GlobalProtect VPN were used as examples. The attack requires the adversary to trick the target user into connecting to an attacker-controlled endpoint through phishing or social engineering. Once successful, the attackers can gain elevated privileges to execute arbitrary codes and conduct other harmful actions.
The researchers have shared technical details about the vulnerability exploits in separate advisories for SonicWall and Palo Alto clients. Watch the video below from HackFest Hollywood 2024 for more information on the “Very Pwnable Networks” targeted by NachoVPN.
The NachoVPN tool has also been released on GitHub for community testing. This tool is compatible with more VPN clients, including Cisco AnyConnect, in addition to the VPNs showcased in the study.
Following the disclosure, the vendors have issued patches to mitigate the vulnerabilities. SonicWall addressed the SSL VPN NetExtender vulnerability (CVE-2024-29014) with the NetExtender Windows (32 and 64 bit) 10.2.341 update. Similarly, Palo Alto Networks fixed the GlobalProtect app vulnerability (CVE-2024-5921) with the GlobalProtect App 6.2.6 and higher releases.
Although there was a delay in addressing the issues, the patches are now accessible to users. It is crucial for all users to update their devices promptly to safeguard against potential threats.
We welcome your thoughts in the comments section.
-
Destination5 months ago
Singapore Airlines CEO set to join board of Air India, BA News, BA
-
Tech News9 months ago
Bangladeshi police agents accused of selling citizens’ personal information on Telegram
-
Breaking News6 months ago
Croatia to reintroduce compulsory military draft as regional tensions soar
-
Guides & Tips7 months ago
Satisfy Your Meat and BBQ Cravings While in Texas
-
Gaming6 months ago
The Criterion Collection announces November 2024 releases, Seven Samurai 4K and more
-
Toys7 months ago
15 Best Magnetic Tile Race Tracks for Kids!
-
Motivation9 months ago
The Top 20 Motivational Instagram Accounts to Follow (2024)
-
Toys8 months ago
15 of the Best Trike & Tricycles Mums Recommend