-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                              ASB-2022.0175.2
              SonicWall Critical SQL Injection Vulnerability
                               25 July 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          Sonicwall GMS (Global Management System)and Analytics On-Prem products
Resolution:       Patch/Upgrade
CVE Names:        CVE-2022-22280  

Comment: CVSS (Max):  None available when published

Revision History: July 25 2022: Updated CVSS (Max) details
                  July 25 2022: Initial Release

OVERVIEW

        SonicWall has released security advisories about an SQL Injection vulnerability affecting GMS (Global Management System)and Analytics On-Prem products [1][2].
        
         


IMPACT

        CVE-2022-22280 is a critical vulnerability with a CVSS 9.4 which results in an Improper Neutralization of Special Elements used in an SQL command in SonicWall 
        GMS and  SonicWall Analytics On-Prem [1][2]. 
        
        This vulnerability can be exploited from the network without requiring authentication or user interaction.
        
        SonicWall PSIRT reports it is not aware of active exploitation of this vulnerability in the wild.


MITIGATION

        SonicWall has released following hotfixes;
        
        GMS 9.3.1-SP2-Hotfix-2
        Analytics 2.5.0.3-Hotfix-1a
        
        SonicWall PSIRT strongly encourages its members to upgrade to the respective patched version immediately to avoid exploitation.


REFERENCES

        [1] Security Notice: SonicWall GMS SQL Injection Vulnerability
            https://www.sonicwall.com/support/notices/security-notice-sonicwall-gms-sql-injection-vulnerability/220613083124303/

        [2] Security Notice: SonicWall Analytics On-Prem SQL Injection
            Vulnerability
            https://www.sonicwall.com/support/knowledge-base/security-notice-sonicwall-analytics-on-prem-sql-injection-vulnerability/220613083254037/

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=/OId
-----END PGP SIGNATURE-----