CVE-2022-22273

9.8 CRITICAL

📋 TL;DR

This CVE allows attackers to execute arbitrary operating system commands on vulnerable SonicWall Secure Remote Access (SRA) and Secure Mobile Access (SMA) appliances through improper input sanitization. It affects end-of-life SRA products and older SMA 100 series firmware versions. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • SonicWall Secure Remote Access (SRA) appliances
  • SonicWall Secure Mobile Access (SMA) 100 series
Versions: SRA: all 8.x, 9.0.0.5-19sv and earlier; SMA 100 series: 9.0.0.9-26sv and earlier
Operating Systems: SonicWall proprietary OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects end-of-life SRA products and older SMA firmware. SMA 100 series running newer firmware may not be affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands with root privileges, install persistent backdoors, exfiltrate sensitive data, and pivot to internal networks.

🟠

Likely Case

Remote code execution leading to credential theft, lateral movement within the network, and deployment of ransomware or other malware.

🟢

If Mitigated

Limited impact if appliances are behind firewalls with strict network segmentation and command execution is restricted through security controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates critical severity with low attack complexity. While no public PoC is confirmed, similar OS command injection vulnerabilities are often weaponized quickly.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: SMA 100 series: Upgrade to firmware versions newer than 9.0.0.9-26sv; SRA: Migrate to supported SMA products as SRA is end-of-life

Vendor Advisory: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0001

Restart Required: Yes

Instructions:

1. For SMA 100 series: Download and install firmware version newer than 9.0.0.9-26sv from SonicWall support portal. 2. For SRA appliances: Migrate to supported SMA products as SRA is end-of-life and no patches are available. 3. Reboot appliances after firmware updates.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate vulnerable appliances from internet and restrict access to trusted networks only

Access Control Lists

all

Implement strict firewall rules to limit inbound connections to necessary IP addresses only

🧯 If You Can't Patch

  • Immediately isolate affected appliances from internet-facing networks
  • Implement network monitoring and intrusion detection for suspicious command execution patterns

🔍 How to Verify

Check if Vulnerable:

Check appliance firmware version via web admin interface or CLI. For SRA: verify if running 8.x or 9.0.0.5-19sv or earlier. For SMA 100: verify if running 9.0.0.9-26sv or earlier.

Check Version:

Login to web admin interface and navigate to System > Status or use CLI command 'show version'

Verify Fix Applied:

Confirm firmware version is newer than affected versions: SMA 100 series > 9.0.0.9-26sv, or SRA appliances have been replaced with supported SMA products.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Failed authentication attempts followed by successful access
  • Unexpected process creation or system modifications

Network Indicators:

  • Suspicious outbound connections from appliances
  • Unusual traffic patterns to/from appliance management interfaces

SIEM Query:

Example: (device_vendor="SonicWall" AND (device_product="SRA" OR device_product="SMA") AND (event_category="command_execution" OR event_category="system_modification"))

🔗 References

📤 Share & Export