Sonicwall Unauthenticated Access Exploitation

We encourage all users of SonicWall appliances to review patch strategy and address this immediately. Edge appliances have been used by malicious actors in the past to gain a foothold in organizations. Successful exploitation of the aforementioned bugs could allow an attacker to unauthorized access to internal resources and even redirect potential victims to malicious websites.

SonicWall has published an advisory warning of a trio of security flaws in its Secure Mobile Access (SMA) 1000 appliances, including a high-severity authentication bypass vulnerability.

  • CVE-2022-22282 (CVSS score: 8.2) – Unauthenticated Access Control Bypass
  • CVE-2022-1702 (CVSS score: 6.1) – URL redirection to an untrusted site (open redirection)
  • CVE-2022-1701 (CVSS score: 5.7) – Use of a shared and hard-coded cryptographic key

At this time the current Fix version is 12.4.1-02994

Impacted Platforms:

  • SMA 1000 Series
  • SMA 6200, 6210
  • SMA 7200, 7210
  • SMA 8000v (ESX, KVM, Hyper-V, AWS, Azure) 

Above vulnerabilities DO NOT impact the following products,

  • SMA 1000 series running versions earlier than 12.4.0
  • SMA 100 series 
  • CMS
  • Remote access clients

Detailed CVE

CVSS ScoreImpacted FirmwareFix VersionCVE ID
1. Unauthenticated Access Control Bypass8.2
2 Use of hard-coded cryptographic key.5.7
3. URL redirection to an untrusted site (open redirection) 6.1


  • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0009