Advisory No: TZCERT/SA/2021/02/04
Date of First Release: 04th February 2021
Source: Sonic Wall
SMA 100 10.x devices (SMA 200, SMA 210, SMA 400, SMA 410, SMA 500v)
This vulnerability is caused by improper SQL command neutralization in SonicWall SSLVPN SMA100 products that could allow unauthenticated, remote attacker exploit for credential access.
In SonicWall SSL VPN SMA 100 products, the SQL injection bug could allow an unauthenticated attacker to perform SQL query to access username, password, and other session-related information. The flaw affects both physical and virtual SMA 100 version 10.x devices.
Successful exploitation of the vulnerability could allow an unprivileged user to gain access to the system.
SonicWall has issued both workaround and security update to address the affected firmware. Users and administrators are advised to upgrade firmware to the latest stable version.
- Enable multifactor authentication (MFA) as a safety measure.
- Enable Web Application Firewall (WAF) on SMA100.
- Reset the passwords for any users who may have logged into the device via the web interface.