CVE-2022-22280

9.8 CRITICAL

📋 TL;DR

This is an unauthenticated SQL injection vulnerability in SonicWall GMS and Analytics On-Prem products. Attackers can execute arbitrary SQL commands without authentication, potentially compromising the database and underlying systems. Organizations running affected versions of SonicWall GMS 9.3.1-SP2-Hotfix1 or earlier, or Analytics On-Prem 2.5.0.3-2520 or earlier are vulnerable.

💻 Affected Systems

Products:
  • SonicWall GMS
  • SonicWall Analytics On-Prem
Versions: GMS 9.3.1-SP2-Hotfix1 and earlier, Analytics On-Prem 2.5.0.3-2520 and earlier
Operating Systems: Not specified - appliance-based
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. The vulnerability requires no authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including database takeover, credential theft, data exfiltration, and potential lateral movement to connected systems.

🟠

Likely Case

Database compromise leading to sensitive information disclosure, configuration manipulation, and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper network segmentation, database hardening, and input validation controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are well-understood attack vectors with many available tools. The unauthenticated nature makes exploitation trivial for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: GMS 9.3.2 and later, Analytics On-Prem 2.5.0.4 and later

Vendor Advisory: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0007

Restart Required: Yes

Instructions:

1. Download the latest firmware from the SonicWall support portal. 2. Backup current configuration. 3. Apply the update through the management interface. 4. Restart the appliance. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to SonicWall management interfaces to trusted IP addresses only

Web Application Firewall

all

Deploy a WAF with SQL injection protection rules in front of the SonicWall management interface

🧯 If You Can't Patch

  • Immediately isolate affected systems from internet access and restrict to internal management networks only
  • Implement strict network access controls and monitor all traffic to/from SonicWall management interfaces

🔍 How to Verify

Check if Vulnerable:

Check the product version in the SonicWall management interface under System > Status > Product Information

Check Version:

Not applicable - check via web interface

Verify Fix Applied:

Verify the version is GMS 9.3.2 or later, or Analytics On-Prem 2.5.0.4 or later in the management interface

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed authentication attempts followed by successful access
  • Unexpected database schema changes

Network Indicators:

  • SQL injection patterns in HTTP requests to management interfaces
  • Unusual outbound database connections from SonicWall appliances

SIEM Query:

source="sonicwall" AND (http_uri="*sql*" OR http_uri="*union*" OR http_uri="*select*" OR http_uri="*insert*")

🔗 References

📤 Share & Export