A Vulnerability in SonicWall SMA 100 Series Could Allow for SQL Injection

ITS Advisory Number: 
2021-020
Date(s) Issued: 
Thursday, February 4, 2021
Date Updated: 
Wednesday, February 24, 2021
Subject: 
A Vulnerability in SonicWall SMA 100 Series Could Allow for SQL Injection
Overview: 

OVERVIEW:

A vulnerability has been discovered in the SonicWall SMA 100 Series, which could allow for SQL injection. The SonicWall SMA 100 Series is a unified secure access gateway that enables organizations to provide access to any application, anytime, from anywhere and any devices, including managed and unmanaged. Successful exploitation of this vulnerability could result in SQL injection, which enables the retrieval of admin credentials. Afterwards, this retrieval can pivot into a remote-code execution attack. Depending on the privileges associated with the application, an attacker could install programs; view, change, or delete data; or create new accounts with full user rights.

 

February 23 - UPDATED OVERVIEW:

SonicWall conducted additional reviews to further strengthen the code for the SMA 100 series. New firmware versions available for both 10.x and 9.x code on the SMA 100 series products.

 

THREAT INTELLIGENCE:

There are currently reports of this vulnerability being exploited in the wild as per NCCGroup.

 

Systems Affected: 
  • SonicWall SMA 200, SMA 210, SMA 400, SMA 410
  • SonicWall SMA 500v (Azure, AWS, ESXi, HyperV)
RISK
GOVERNMENT
Large and medium government entities: 
High
Small government entities: 
High
BUSINESS
Large and medium business entities: 
High
Small business entities: 
High
Home Users: 
Low
Description: 

A vulnerability has been discovered in the SonicWall SMA 100 Series, which could allow for SQL injection. The improper SQL command neutralization in the SonicWall SSLVPN SMA100 product enables the execution of SQL commands of the attacker's choosing.

 

Successful exploitation of this vulnerability could result in SQL injection, which enables the retrieval of admin credentials. Afterwards, this retrieval can pivot into a remote-code execution attack. Depending on the privileges associated with the application, an attacker could install programs; view, change, or delete data; or create new accounts with full user rights.

 

February 23 - UPDATED DESCRIPTION:

SonicWall conducted additional reviews to further strengthen the code for the SMA 100 series. New firmware versions available for both 10.x and 9.x code on the SMA 100 series products.

 

The new SMA 10.2 firmware includes:

  • Code-hardening fixes identified during an internal code audit
  • Rollup of customer issue fixes not included in the Feb. 3 patch
  • General performance enhancements
  • Previous SMA 100 series zero-day fixes posted on Feb. 3

 

The new 9.0 firmware includes:

  • Code-hardening fixes identified during an internal code audit
Actions: 
  • After appropriate testing, immediately apply the patched version of the SMA 10.x firmware to vulnerable systems.
  • Apply appropriate countermeasures recommended by SonicWall within their advisory
  • Apply the Principle of Least Privilege to all systems and services.

 

February 23 - UPDATED ACTIONS:

We recommend the following actions be taken:

  • After appropriate testing, immediately apply the patched versions of SMA 10.x or 9.x firmware to vulnerable systems.