SonicWall has released patches for multiple vulnerabilities in its Secure Mobile Access (SMA) series appliances, including a high-severity issue that could lead to unauthorized access.
Tracked as CVE-2022-22282 (CVSS score of 8.2), the vulnerability is described as an unauthenticated access control bypass, where the access to a specific resource is incorrectly restricted.
According to SonicWall, SMA1000 series “incorrectly restricts access to a resource using HTTP connections from an unauthorized actor leading to Improper Access Control vulnerability.” The bug impacts the SMA1000 series firmware versions 12.4.0, 12.4.1-02965, and earlier.
SonicWall explains that an attacker may exploit the vulnerability by crafting connections from an unauthenticated position. Successful exploitation allows the attacker to gain access to internal resources.
SonicWall also patched CVE-2022-1701 (CVSS score of 5.7), a vulnerability where a shared and hardcoded encryption key is used across the SMA1000 series to store data.
An attacker able to exploit this medium-severity security hole could access encrypted credentials, the network security firm says.
The third vulnerability that SonicWall addressed was an open redirection. Tracked as CVE-2022-1702 (CVSS score of 6.1), the issue exists because the appliances “accept a user-controlled input that specifies a link to an external site and uses that link in a redirect.”
According to SonicWall, these vulnerabilities impact SMA 6200, 6210, 7200, 7210, and 8000v (ESX, KVM, Hyper-V, AWS, Azure) appliances. SMA1000 series firmware version 12.4.1-02994 contains the necessary patches.
“There are no temporary mitigations. SonicWall urges impacted customers to implement applicable patches as soon as possible,” SonicWall says.
The company also notes that none of these vulnerabilities appear to be exploited in attacks. However, it’s important that customers install the patches as SMA appliances are known to have been targeted by threat actors.
Related: SonicWall Patches Critical Vulnerability in Firewall Appliances
Related: Details Disclosed for Recent Vulnerabilities in SonicWall Remote Access Appliances
Related: SonicWall Patches Y2K22 Bug in Email Security, Firewall Products

More from Ionut Arghire
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- 820k Impacted by Data Breach at Zacks Investment Research
- US Government Agencies Warn of Malicious Use of Remote Management Software
- Chinese Hackers Adopting Open Source ‘SparkRAT’ Tool
- CISA Provides Resources for Securing K-12 Education System
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
