Multiple Vulnerabilities in SonicWall SMA/SRA Appliances (CVE-2019-7481, CVE-2019-7482,CVE-2019-7483, CVE-2019-7484, CVE-2019-7485, CVE-2019-7486)
First Published: 26 Feb 2020 14:00 GMT
Status: Developing
Last Updated: 26 Feb 2020 14:00 GMT
CVSS Score: 9.8
On 18 Dec 2019, SonicWall CSIRT released Security Advisories SNWLID-2019-0016 to SNWLID-2019-0021 [link], which identified a vulnerabilities in SonicWall Secure Mobile Access (SMA) appliances. The most dangerous one among them, CVE-2019-7482, could allow an unauthenticated attacker to execute arbitrary code on the device.
The vulnerability received a score of 9.8 and was deemed Critical.
Affected software builds are 9.0.0.3 and earlier. Vulnerabilities have been fixed in the release 9.0.0.4, which is available for download from My SonicWall Download Center.
The original advisory stated only SMA100 appliance are vulnerable, but my tests showed that at least SMA500v and old Secure Remote Access (SRA) appliances share the same code base and therefore also vulnerable. SMA200 and SMA400 running vulnerable software version also could be at risk. SMA 6200, 7200, 8200v and 9000 seem to be built on other platform and not affected.
18 Dec 2019: SonicWall announces vulnerabilities.
11 Feb 2020: Alain Mowat, who had found the vulnerabilities, published the details.
26 Feb 2020: Scope of vulnerability estimated by this report.
As of 2 Mar 2020 there are about 15,000 relevant devices on the Internet, and about 77% of them seem to be vulnerable. About 1.7% (269 devices) have been patched since last week.
TOP-10 of AS owners by count of vulnerable devices is shown below.
Organization | # of devices |
---|---|
Comcast Cable Communications, LLC | 1,057 |
MCI Communications Services, Inc. d/b/a Verizon Business | 403 |
Charter Communications Inc | 399 |
AT&T Services, Inc. | 366 |
Deutsche Telekom AG | 298 |
Cablevision Systems Corp. | 266 |
Level 3 Parent, LLC | 238 |
Asahi Net | 231 |
Cox Communications Inc. | 228 |
NTT Communications Corporation | 218 |
If you are security representative of AS owner or country CERT who wants to track the spread of the vulnerability in the networks you are responsible please contact me via email or Twitter. All data sets are freely available for authorized persons.
At the moment there is no public exploit available. Based on information disclosed by Alain Mowat, these entry points should be monitored:
- GET to /cgi-bin/supportLogin, for SQL Injection patterns in customerTID parameter,
- GET to /cgi-bin/supportLogin, for unusually long User-Agent header values,
- GET to /cgi-bin/handleWAFRedirect, for Path Traversal patterns in hdl parameter.
Unfortunately, network traffic to the vulnerabilities entry points is encrypted by TLS, so there is no convenient way to detect exploiting attempts. You have to manage to obtain the unencrypted copy of traffic before applying detection rules.
At this point there are no evidence of any public exploitation attempts.
Thanks to Alain Mowat (@plopz0r) of SCRT who discovered these vulnerabilities.
Twitter: @b4baysky
Email: [email protected]
https://psirt.global.sonicwall.com/vuln-list
https://blog.scrt.ch/2020/02/11/sonicwall-sra-and-sma-vulnerabilties/