Overview
- Description
- Improper neutralization of a SQL Command leading to SQL Injection vulnerability impacting end-of-life Secure Remote Access (SRA) products, specifically the SRA appliances running all 8.x firmware and 9.0.0.9-26sv or earlier
- Source
- PSIRT@sonicwall.com
- NVD status
- Analyzed
- CNA Tags
- unsupported-when-assigned
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Known exploits
Data from CISA
- Vulnerability name
- SonicWall Secure Remote Access (SRA) SQL Injection Vulnerability
- Exploit added on
- Mar 28, 2022
- Exploit action due
- Apr 18, 2022
- Required action
- The impacted product is end-of-life and should be disconnected if still in use.
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:sonicwall:sma_210_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA095C77-9E99-4086-A665-D15B62ED6318", "versionEndExcluding": "9.0.0.10-28sv", "versionStartIncluding": "8.0.0.0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:sonicwall:sma_210:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "51587338-4A5F-41FC-9497-743F061947C2" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:sonicwall:sma_410_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D82266A9-0420-4C82-B7CE-6E35A197C774", "versionEndExcluding": "9.0.0.10-28sv", "versionStartIncluding": "8.0.0.0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:sonicwall:sma_410:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9DFB8FBC-FFA4-4526-B306-D5692A43DC9E" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:sonicwall:sma_500v_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A5ACCFB-D882-4F7D-8CE4-3608B1053708", "versionEndExcluding": "9.0.0.10-28sv", "versionStartIncluding": "8.0.0.0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:sonicwall:sma_500v:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A6AD8A33-7CE4-4C66-9E23-F0C9C9638770" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:sonicwall:sra_4600_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A1739FF-3445-4155-BCD5-FFC3ADC7BB11", "versionEndExcluding": "9.0.0.10-28sv", "versionStartIncluding": "8.0.0.0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:sonicwall:sra_4600:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2FC9EDA7-6306-4AC0-BBA2-BFC4D6EF7D05" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:sonicwall:sra_1600_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56142ABA-8DB5-40C4-B485-CA440BC26EB5", "versionEndExcluding": "9.0.0.10-28sv", "versionStartIncluding": "8.0.0.0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:sonicwall:sra_1600:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A19AAF5D-B03D-40BB-AF3C-8BAEFD60C0F7" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:sonicwall:sra_va_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "403EDB9C-7FAE-496D-8307-B76FBC02FE50", "versionEndExcluding": "9.0.0.10-28sv", "versionStartIncluding": "8.0.0.0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:sonicwall:sra_va:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "43D2892B-20AF-4832-8C14-C2570804A4D0" } ], "operator": "OR" } ], "operator": "AND" } ]