CVE-2019-7481: SonicWall SMA100 SQL Injection and Its Role in Ransomware
Summary: CVE-2019-7481 is a critical SQL injection in SonicWall SMA100 devices. Despite a 2019 disclosure, it remains heavily exploited—by groups including HelloKitty and LockBit—and is listed in CISA’s Known Exploited Vulnerabilities (KEV). EPSS is extremely high (94.34%), signaling ongoing risk and likely targeting [1].
TL;DR
-
What: SQLi in SonicWall SMA100 (≤ 9.0.0.3) [1][4], CWE-89.
-
Why it matters: Easy, unauthenticated, internet-facing. Widely used for initial access in ransomware ops.
-
Who’s using it: HelloKitty, LockBit 3.0, other eCrime actors; activity persists years after disclosure [1][12][14][15][16].
-
Fix: Upgrade firmware (≥ 9.0.0.4 for SMA100) and follow vendor hardening. Disconnect end-of-life devices if they can’t be patched [1][4][14].
-
Do now: Patch or isolate, enforce MFA, segment networks, monitor for SQLi patterns, and hunt for persistence.
Technical Analysis
Root cause. Improper input neutralization (CWE-89) in the SMA100 web interface allows SQL injection via crafted HTTP parameters [1].
Scope. Affects SMA100 (≤ 9.0.0.3); later research showed related impact to SRA appliances on 8.x/9.x in the field [13].
Access. Remote, unauthenticated, no user interaction: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N [1].
Impact. High confidentiality exposure. Although often described as “read-only,” FortiGuard notes exploitation via malicious HTTP requests may lead to broader effects depending on implementation [2].
Why attackers like it. Internet-facing, low-complexity, and fast to scan/exploit at scale.
Threat Activity & Actors
-
Continued exploitation. EPSS 94.34% indicates near-certain exploitation over any 30-day window [1].
-
Ransomware adoption. Observed in playbooks of HelloKitty and LockBit 3.0 with automated scanning → exploit → recon → persistence → payload [12][14][15][16].
-
Broader ops. CrowdStrike incident response ties eCrime activity to SRA 4600 devices (EoL) as well [13].
-
State nexus. APT41 has incorporated the vulnerability into multi-stage campaigns (details limited) [11].
-
Persistence of interest. Exploitation documented well past patch release due to slow patching, EoL hardware, and enduring effectiveness [14][15].
Ransomware Use Case Pattern
-
Discovery: Internet-wide scans for SMA/SRA banners.
-
Exploit: SQLi for configuration/credential intel, foothold.
-
Post-exploit: Persistence, remote admin tooling, credential harvesting, lateral movement.
-
Impact: Encryption/Extortion on critical systems; operational disruption and financial loss [13][14][15][16].
Vendor Response & Patch Management
-
Advisory. SonicWall PSIRT (SNWLID-2019-0016) advises upgrading SMA100 to ≥ 9.0.0.4 [1][4].
-
KEV listing. Added Nov 3, 2021; U.S. FCEB remediation deadline May 3, 2022 [1][5].
-
Expanded scope. CrowdStrike surfaced impact to SRA 4600 (8.x/9.x) not initially disclosed; SonicWall later issued urgent notices, including ransomware risk warnings (July 2021) [13][14].
-
EoL guidance. Disconnect unsupported appliances if they can’t be patched [14].
Detection & Monitoring
Network/IPS
-
Enable FortiGuard/IPS signature “
SonicWall.SMA100.Support.Installer.SQL.Injection” or vendor-equivalent [2]. -
Watch for SQLi indicators in HTTP requests to SMA endpoints (metacharacters, atypical params/payloads).
Logs/SIEM
-
Baseline SMA auth and DB access patterns; alert on anomalies.
-
Correlate: spikes in DB queries from external sources + unusual auth + odd web requests.
Endpoint/EDR
-
Hunt for new persistence mechanisms, remote admin tools, credential dumpers, and lateral movement following device access.
Threat intel
-
Track IOCs and TTPs tied to HelloKitty, LockBit, and related campaigns leveraging this CVE.
Hardening & Mitigation
Immediate
-
Patch/replace: Upgrade SMA100 to fixed firmware; replace or disconnect EoL SRA appliances [1][4][14].
-
Isolate: Place SMA/SRA in restricted segments; block unnecessary inbound/outbound paths.
-
MFA: Enforce for all admin and remote access accounts [13].
-
WAF/Reverse proxy: Filter/sanitize HTTP requests targeting management interfaces.
-
IPS: Enable SonicWall-specific signatures and generic SQLi rules [2].
Ongoing
-
Least privilege: Tighten admin roles, rotate creds, audit access regularly.
-
Config hygiene: Disable unused services; enable robust logging; follow vendor hardening guides.
-
Monitoring: Continuous detection for SQLi and post-exploitation behaviors.
-
IR readiness: Playbooks for device compromise, credential resets, and network containment.
Action Checklist (Copy/Paste)
-
Identify all SMA100/SRA devices and their firmware versions.
-
Upgrade SMA100 to ≥ 9.0.0.4; replace or disconnect unsupported SRA.
-
Enforce MFA across admin/remote access.
-
Put appliances behind segmentation and a reverse proxy/WAF.
-
Turn on/verify IPS signatures for this CVE and generic SQLi.
-
Baseline logs; add SIEM rules for SQLi patterns and device anomalies.
-
Hunt for persistence, remote tools, and lateral movement.
-
Rotate credentials and review admin roles.
-
Document and test your IR steps for appliance compromise.
Notes & References
[1] CISA KEV; SonicWall advisory (SNWLID-2019-0016); EPSS reference.
[2] FortiGuard IPS signature details.
[4] SonicWall firmware guidance for SMA100.
[5] KEV listing/remediation timeline.
[11][12][13][14][15][16] Public reporting and IR writeups (APT41 mention; HelloKitty/LockBit activity; CrowdStrike analyses; BleepingComputer campaign coverage).



