First published: Fri Jun 03 2022(Updated: )
Improper neutralization of special elements in the SonicWall SSL-VPN SMA100 series management interface allows a remote authenticated attacker to inject OS Commands which potentially leads to remote command execution vulnerability or denial of service (DoS) attack.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sonicwall Sma 210 Firmware | <=10.2.1.4-31sv | |
Sonicwall Sma 210 | ||
Sonicwall Sma 410 Firmware | <=10.2.1.4-31sv | |
Sonicwall Sma 410 | ||
Sonicwall Sma 500v Firmware | <=10.2.1.4-31sv | |
Sonicwall Sma 500v | ||
Sonicwall Sma 210 Firmware | <=10.2.0.9-41sv | |
Sonicwall Sma 410 Firmware | <=10.2.0.9-41sv | |
Sonicwall Sma 500v Firmware | <=10.2.0.9-41sv |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1703 is a vulnerability in the SonicWall SSL-VPN SMA100 series management interface that allows a remote authenticated attacker to inject OS commands, potentially leading to remote command execution or a denial of service attack.
CVE-2022-1703 has a severity rating of 8.8 (critical).
Sonicwall SMA 210 Firmware versions up to and including 10.2.1.4-31sv, Sonicwall SMA 410 Firmware versions up to and including 10.2.1.4-31sv, and Sonicwall SMA 500v Firmware versions up to and including 10.2.1.4-31sv are affected by CVE-2022-1703.
An attacker can exploit CVE-2022-1703 by injecting malicious OS commands through the SonicWall SSL-VPN SMA100 series management interface.
Yes, it is recommended to update to Sonicwall SMA 210 Firmware version 10.2.1.5-34sv, Sonicwall SMA 410 Firmware version 10.2.1.5-34sv, or Sonicwall SMA 500v Firmware version 10.2.1.5-34sv to mitigate the vulnerability.