SonicWall: Patch critical SQL injection bug immediately

SonicWall has published a security advisory today to warn of a critical SQL injection flaw impacting the GMS (Global Management System) and Analytics On-Prem products.

“SonicWall PSIRT strongly suggests that organizations using the Analytics On-Prem version outlined below should upgrade to the respective patched version immediately,” warns SonicWall in an advisory.

The flaw, tracked as CVE-2022-22280, allows SQL injection due to improper neutralization of special elements used in an SQL Command.

It carries a severity rating of 9.4, categorizing it as “critical”, and is exploitable from the network without requiring authentication or user interaction, while it also has low attack complexity.

SonicWall clarifies that they are not aware of any reports of active exploitation in the wild or the existence of a proof of concept (PoC) exploit for this vulnerability as of yet.

However, applying the available security updates and mitigations is crucial to minimize the chances of attackers exploiting the bug.

SQL injection is a bug that allows attackers to modify a legitimate SQL query so that it performs unexpected behavior by inputting a string of specially crafted code in a web page’s form or URL query variables.

Using this flaw, attackers can access data they usually should not have access to, bypass authentication, or potentially delete data from the database.

Considering the widespread deployment of SonicWall GMS and Analytics, which are used for central management, rapid deployment, real-time reporting, and data insight, the attack surface is significant and typically on critical organizations.

Additionally, SonicWall recommends the incorporation of a Web Application Firewall (WAF), which should be adequate for blocking SQL injection attacks even on unpatched deployments.

Share Blog
Share this
[wp_social_sharing social_options='facebook,twitter,linkedin' twitter_username='arjun077' facebook_text='Share on Facebook' twitter_text='Share on Twitter' linkedin_text='Share on Linkedin' pinterest_text='Share on Pinterest' xing_text='Share on Xing' reddit_text='Share on Reddit' icon_order='f,t,l,p,x,r,i' show_icons='0' before_button_text='' text_position='' social_image='']