
====================================================================

                             CERT-Renater

                 Note d'Information No. 2021/VULN360
_____________________________________________________________________

DATE                : 15/07/2021

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running SonicWall SSLVPN SMA/SRA versions
                                 prior to 9.0.0.10-28sv.

=====================================================================
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0017
_____________________________________________________________________

Improper Neutralization of Special Elements used in an SQL Command
leading to SQL Injection vulnerability Impacting End-Of-Life SRA
Appliances


9.8


Overview

Advisory ID             SNWLID-2021-0017
First Published         2021-07-14
Last Updated            2021-07-14
Workaround              false
Status                  Applicable
CVE                     N/A
CWE                     CWE-89
CVSS v3                 9.8
CVSS Vector             CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Direct Link

	
Summary

SonicWall is aware of improper neutralization of a SQL Command leading
to SQL Injection vulnerability, reported by CrowdStrike, impacting
end-of-life Secure Remote Access (SRA) products, specifically the SRA
appliances running all 8.x firmware or an old version of firmware 9.x
(9.0.0.9-26sv or earlier).

In February 2021, SonicWall released SMA firmware 10.2.0.7 and 9.0.0.10
to fix a zero-day vulnerability, along with additional comprehensive
code-strengthening. This strengthening proactively prevented this newly
reported vulnerability in 9.0.0.10.

    Organizations that already upgraded to the 9.0.0.10 firmware are
already protected against this newly reported issue and don’t need to
take any action.

    Organizations with any 10.x version is not subject to this
vulnerability as the vulnerable feature was deprecated in the 10.x
release.

    Organizations running any firmware versions of 8.x or older than
9.0.0.10 or 10.2.0.7 should, per our earlier instructions, upgrade
immediately. These older versions may potentially be exploited if not
patched immediately.

    SMA 1000 Series products are not affected by this vulnerability.


Affected Product(s)

Product
	
SonicWall SSLVPN          Affected Version

SMA/SRA                  8.x, 9.0.0.9-26sv and earlier



CPE(s)
Workaround


Fixed Software

Product
	
SonicWall SSLVPN       Fixed Version

SMA/SRA                9.0.0.10-28sv and higher



Comments

Credit(s)

Heather Smith, Hanno Heinrichs - CrowdStrike Services



Revision History

    Version

    1.0

    Date

    14-Jul-2021

    Description

    Initial Release.


Reference(s)

https://www.sonicwall.com/support/product-notification/security-advisory-patched-vulnerability-impacting-end-of-life-sra-appliances/210615194924223/


=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================




