SonicWall Issues Patch for Critical Bug Affecting its Analytics and GMS Products

News

Network security company SonicWall on Friday rolled out fixes to mitigate a critical SQL injection (SQLi) vulnerability affecting its Analytics On-Prem and Global Management System (GMS) products.

The vulnerability, tracked as CVE-2022-22280, is rated 9.4 for severity on the CVSS scoring system and stems from what the company describes is an “improper neutralization of special elements” used in an SQL command that could lead to an unauthenticated SQL injection.

CyberSecurity

“Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data,” MITRE notes in its description of SQL injection.

SonicWall

“This can be used to alter query logic to bypass security checks, or to insert additional statements that modify the back-end database, possibly including execution of system commands.”

H4lo and Catalpa of DBappSecurity HAT Lab have been credited with discovering and reporting the flaws which affect 2.5.0.3-2520 and earlier versions of Analytics On-Prem as well as all versions of GMS prior to and including 9.3.1-SP2-Hotfix1.

CyberSecurity

Organizations relying on vulnerable appliances are recommended to upgrade to Analytics 2.5.0.3-2520-Hotfix1 and GMS 9.3.1-SP2-Hotfix-2.

“There is no workaround available for this vulnerability,” SonicWall said. “However, the likelihood of exploitation may be significantly reduced by incorporating a Web Application Firewall (WAF) to block SQLi attempts.”

Products You May Like

Articles You May Like

Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia
Palo Alto Networks Patches Critical Firewall Vulnerability
Warning: DEEPDATA Malware Exploiting Unpatched Fortinet Flaw to Steal VPN Credentials
The Problem of Permissions and Non-Human Identities – Why Remediating Credentials Takes Longer Than You Think
10 Most Impactful PAM Use Cases for Enhancing Organizational Security

Leave a Reply

Your email address will not be published. Required fields are marked *