CVE-2024-47948: Path Traversal Vulnerability in JetBrains TeamCity
July 26, 2025
Critical Unauthenticated RCE in React Server Components (React2Shell, CVE-2025-55182)
December 10, 2025

CVE-2019-7481: SonicWall SMA100 SQL Injection and Its Role in Ransomware

by CyRisk

    CVE-2019-7481: SonicWall SMA100 SQL Injection and Its Role in Ransomware

    Summary: CVE-2019-7481 is a critical SQL injection in SonicWall SMA100 devices. Despite a 2019 disclosure, it remains heavily exploited—by groups including HelloKitty and LockBit—and is listed in CISA’s Known Exploited Vulnerabilities (KEV). EPSS is extremely high (94.34%), signaling ongoing risk and likely targeting [1].


    TL;DR

    • What: SQLi in SonicWall SMA100 (≤ 9.0.0.3) [1][4], CWE-89.

    • Why it matters: Easy, unauthenticated, internet-facing. Widely used for initial access in ransomware ops.

    • Who’s using it: HelloKitty, LockBit 3.0, other eCrime actors; activity persists years after disclosure [1][12][14][15][16].

    • Fix: Upgrade firmware (≥ 9.0.0.4 for SMA100) and follow vendor hardening. Disconnect end-of-life devices if they can’t be patched [1][4][14].

    • Do now: Patch or isolate, enforce MFA, segment networks, monitor for SQLi patterns, and hunt for persistence.


    Technical Analysis

    Root cause. Improper input neutralization (CWE-89) in the SMA100 web interface allows SQL injection via crafted HTTP parameters [1].
    Scope. Affects SMA100 (≤ 9.0.0.3); later research showed related impact to SRA appliances on 8.x/9.x in the field [13].
    Access. Remote, unauthenticated, no user interaction: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N [1].
    Impact. High confidentiality exposure. Although often described as “read-only,” FortiGuard notes exploitation via malicious HTTP requests may lead to broader effects depending on implementation [2].
    Why attackers like it. Internet-facing, low-complexity, and fast to scan/exploit at scale.


    Threat Activity & Actors

    • Continued exploitation. EPSS 94.34% indicates near-certain exploitation over any 30-day window [1].

    • Ransomware adoption. Observed in playbooks of HelloKitty and LockBit 3.0 with automated scanning → exploit → recon → persistence → payload [12][14][15][16].

    • Broader ops. CrowdStrike incident response ties eCrime activity to SRA 4600 devices (EoL) as well [13].

    • State nexus. APT41 has incorporated the vulnerability into multi-stage campaigns (details limited) [11].

    • Persistence of interest. Exploitation documented well past patch release due to slow patching, EoL hardware, and enduring effectiveness [14][15].


    Ransomware Use Case Pattern

    1. Discovery: Internet-wide scans for SMA/SRA banners.

    2. Exploit: SQLi for configuration/credential intel, foothold.

    3. Post-exploit: Persistence, remote admin tooling, credential harvesting, lateral movement.

    4. Impact: Encryption/Extortion on critical systems; operational disruption and financial loss [13][14][15][16].


    Vendor Response & Patch Management

    • Advisory. SonicWall PSIRT (SNWLID-2019-0016) advises upgrading SMA100 to ≥ 9.0.0.4 [1][4].

    • KEV listing. Added Nov 3, 2021; U.S. FCEB remediation deadline May 3, 2022 [1][5].

    • Expanded scope. CrowdStrike surfaced impact to SRA 4600 (8.x/9.x) not initially disclosed; SonicWall later issued urgent notices, including ransomware risk warnings (July 2021) [13][14].

    • EoL guidance. Disconnect unsupported appliances if they can’t be patched [14].


    Detection & Monitoring

    Network/IPS

    • Enable FortiGuard/IPS signature “SonicWall.SMA100.Support.Installer.SQL.Injection” or vendor-equivalent [2].

    • Watch for SQLi indicators in HTTP requests to SMA endpoints (metacharacters, atypical params/payloads).

    Logs/SIEM

    • Baseline SMA auth and DB access patterns; alert on anomalies.

    • Correlate: spikes in DB queries from external sources + unusual auth + odd web requests.

    Endpoint/EDR

    • Hunt for new persistence mechanisms, remote admin tools, credential dumpers, and lateral movement following device access.

    Threat intel

    • Track IOCs and TTPs tied to HelloKitty, LockBit, and related campaigns leveraging this CVE.


    Hardening & Mitigation

    Immediate

    • Patch/replace: Upgrade SMA100 to fixed firmware; replace or disconnect EoL SRA appliances [1][4][14].

    • Isolate: Place SMA/SRA in restricted segments; block unnecessary inbound/outbound paths.

    • MFA: Enforce for all admin and remote access accounts [13].

    • WAF/Reverse proxy: Filter/sanitize HTTP requests targeting management interfaces.

    • IPS: Enable SonicWall-specific signatures and generic SQLi rules [2].

    Ongoing

    • Least privilege: Tighten admin roles, rotate creds, audit access regularly.

    • Config hygiene: Disable unused services; enable robust logging; follow vendor hardening guides.

    • Monitoring: Continuous detection for SQLi and post-exploitation behaviors.

    • IR readiness: Playbooks for device compromise, credential resets, and network containment.


    Action Checklist (Copy/Paste)

    • Identify all SMA100/SRA devices and their firmware versions.

    • Upgrade SMA100 to ≥ 9.0.0.4; replace or disconnect unsupported SRA.

    • Enforce MFA across admin/remote access.

    • Put appliances behind segmentation and a reverse proxy/WAF.

    • Turn on/verify IPS signatures for this CVE and generic SQLi.

    • Baseline logs; add SIEM rules for SQLi patterns and device anomalies.

    • Hunt for persistence, remote tools, and lateral movement.

    • Rotate credentials and review admin roles.

    • Document and test your IR steps for appliance compromise.


    Notes & References

    [1] CISA KEV; SonicWall advisory (SNWLID-2019-0016); EPSS reference.
    [2] FortiGuard IPS signature details.
    [4] SonicWall firmware guidance for SMA100.
    [5] KEV listing/remediation timeline.
    [11][12][13][14][15][16] Public reporting and IR writeups (APT41 mention; HelloKitty/LockBit activity; CrowdStrike analyses; BleepingComputer campaign coverage).

    Leave a Reply

    Discover more from CyRisk

    Subscribe now to keep reading and get access to the full archive.

    Continue reading