Sonicwall Unauthenticated Access Exploitation
We encourage all users of SonicWall appliances to review patch strategy and address this immediately. Edge appliances have been used by malicious actors in the past to gain a foothold in organizations. Successful exploitation of the aforementioned bugs could allow an attacker to unauthorized access to internal resources and even redirect potential victims to malicious websites.
SonicWall has published an advisory warning of a trio of security flaws in its Secure Mobile Access (SMA) 1000 appliances, including a high-severity authentication bypass vulnerability.
- CVE-2022-22282 (CVSS score: 8.2) – Unauthenticated Access Control Bypass
- CVE-2022-1702 (CVSS score: 6.1) – URL redirection to an untrusted site (open redirection)
- CVE-2022-1701 (CVSS score: 5.7) – Use of a shared and hard-coded cryptographic key
At this time the current Fix version is 12.4.1-02994
Impacted Platforms:
- SMA 1000 Series
- SMA 6200, 6210
- SMA 7200, 7210
- SMA 8000v (ESX, KVM, Hyper-V, AWS, Azure)
Above vulnerabilities DO NOT impact the following products,
- SMA 1000 series running versions earlier than 12.4.0
- SMA 100 series
- CMS
- Remote access clients
Detailed CVE
CVSS Score | Impacted Firmware | Fix Version | CVE ID | |
1. Unauthenticated Access Control Bypass | 8.2 (High) | 12.4.0 12.4.1 | 12.4.1-02994 | CVE-2022-22282 |
2 Use of hard-coded cryptographic key. | 5.7 (Medium) | 12.4.012.4.1 | 12.4.1-02994 | CVE-2022-1701 |
3. URL redirection to an untrusted site (open redirection) | 6.1 (Medium) | 12.4.012.4.1 | 12.4.1-02994 | CVE-2022-1702 |
References
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0009