SSLVPN SMA1000 Bugs

SonicWall issued a security notice urging customers to immediately patch several vulnerabilities that are considered high-risk affecting its Secure Mobile Access (SMA) 1000 Series line of products.

This can allow attackers to bypass authorization and, potentially, compromise unpatched appliances. The flaw tracked as CVE-2022-22282 in an unauthenticated access control bypass flaw affects SMA1000 series firmware 12.4.0, 12.4.1-02965, and earlier versions. The flaw was rated high severity.

“SonicWall SMA1000 series firmware 12.4.0, 12.4.1-02965 and earlier versions incorrectly restrict access to a resource using HTTP connections from an unauthorized actor leading to Improper Access Control vulnerability”, reads the description of this issue.

The Sonic Wall also addressed the issue tracked as CVE-2022-1701, a hard-coded cryptographic key, the flaw is rated as medium severity.

The third issue was tracked as CVE-2022-1702 leads to open redirection vulnerability, rated as medium severity.

Therefore out of the three vulnerabilities, CVE-2022-22282 is the most severe as it allows unauthenticated attackers to bypass access control and gain access to internal resources.

The company pointed out that there are no temporary mitigations. “SonicWall urges impacted customers to implement applicable patches as soon as possible.” says the report.

Impacted Platforms: SMA 1000 Series

SMA 6200, 6210, 7200, 7210, 8000v (ESX, KVM, Hyper-V, AWS, Azure)

No Impact

According to the report, the following products are not impacted.

  • SMA 1000 series running versions earlier than 12.4.0
  • SMA 100 series
  • CMS
  • Remote access clients

SonicWall strongly urges that organizations using the SMA 1000 series products upgrade to the latest patch.

Guru Baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.