Description
Improper neutralization of special elements used in an SQL command (“SQL Injection”) in SonicWall SMA1000 series appliances allows a remote authenticated attacker with read-only administrator privileges to escalate privileges to primary administrator.
Published: 2026-04-09
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via Remote Authenticated SQL Injection
Action: Apply Patch
AI Analysis

Impact

An SQL injection flaw exists in the SonicWall SMA1000 series appliances due to improper neutralization of special characters in SQL commands. An attacker who has authenticated with read‑only administrator privileges can exploit this vulnerability to elevate their rights, ultimately gaining primary administrator access. This allows full control over the appliance, including configuration changes, data exfiltration, and further network compromise.

Affected Systems

The affected devices are SonicWall SMA1000 series network security appliances. No specific firmware or software version is listed in the advisory, so all current SMA1000 units should be considered vulnerable until a vendor patch is available.

Risk and Exploitability

The vulnerability is remote and requires only authenticated access with read‑only rights, a privilege level that is usually granted for monitoring purposes. Because the flaw permits privilege escalation to primary administrator, the potential impact is high, giving an attacker full administrative control. No CVSS or EPSS scores are supplied, but the lack of exploit probability data and absence from the KEV catalog suggest that while the vulnerability is serious, the likelihood of widespread exploitation remains uncertain.

Generated by OpenCVE AI on April 9, 2026 at 16:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware or security patch released by SonicWall
  • Restrict read‑only administrator accounts to trusted personnel only
  • Segregate SMA1000 appliances from critical management networks and monitor for anomalous activity
  • If a patch is not yet available, enforce least‑privilege access controls and regularly audit configuration changes

Generated by OpenCVE AI on April 9, 2026 at 16:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Title SQL Injection Enables Privilege Escalation in SonicWall SMA1000 Appliances

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Sonicwall
Sonicwall sma1000
Vendors & Products Sonicwall
Sonicwall sma1000

Thu, 09 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description Improper neutralization of special elements used in an SQL command (“SQL Injection”) in SonicWall SMA1000 series appliances allows a remote authenticated attacker with read-only administrator privileges to escalate privileges to primary administrator.
Weaknesses CWE-89
References

Subscriptions

Sonicwall Sma1000
cve-icon MITRE

Status: PUBLISHED

Assigner: sonicwall

Published:

Updated: 2026-04-10T03:56:03.540Z

Reserved: 2026-03-13T11:57:18.440Z

Link: CVE-2026-4112

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-09T15:16:13.517

Modified: 2026-04-09T15:16:13.517

Link: CVE-2026-4112

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:32:49Z

Weaknesses