Cybersecurity Experts Warn of VPN Vulnerabilities in 2024
Cybersecurity experts have raised alarms over a surge in malicious attacks exploiting vulnerabilities in remote access technologies, particularly VPNs, in 2024. This trend, which began during the pandemic, has seen threat actors targeting outdated systems and unpatched flaws, leading to significant breaches.
The shift to remote work during the pandemic led many organizations to prioritize productivity over security, resulting in insecure default settings and inadequate patching processes. This has left legacy remote access technologies, such as VPN concentrators, vulnerable to exploitation. In the last 12 months, numerous critical vulnerabilities have been exploited, including CVE-2023-46805, CVE-2024-21887, and CVE-2023-6548, among others.
One notable campaign, ArcaneDoor, targeted older Cisco ASA 5500-X devices, leading to potential full system compromise. Meanwhile, SonicWall SSL VPNs were exploited in late July 2025, resulting in malicious logins and ransomware infections, including a case at Okuma Europe GmbH. These incidents highlight the ongoing threat posed by unpatched vulnerabilities in remote access technologies.
To mitigate these risks, cybersecurity experts recommend transitioning from traditional VPN technologies to Zero Trust Network Access (ZTNA). By adopting a zero trust approach, organizations can reduce the risk of exploitation by limiting the impact of misconfigurations and zero-day vulnerabilities. Regular patching and prioritizing security alongside productivity are also crucial to protect against evolving cyber threats.