Description
Improper handling of Unicode encoding in SonicWall SMA1000 series appliances allows a remote authenticated SSLVPN user to bypass Workplace/Connect Tunnel TOTP authentication.
Published: 2026-04-09
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Bypass of TOTP authentication protecting SSLVPN sessions
Action: Patch Immediately
AI Analysis

Impact

Improper handling of Unicode encoding in SonicWall SMA1000 series appliances enables a remote authenticated SSLVPN user to bypass Workplace/Connect Tunnel TOTP authentication. This bug can allow an attacker who is already authenticated to substitute a malformed Unicode character and cause the system to skip the one‑time password challenge, granting unauthorized access and potentially exposing protected data. The weakness corresponds to CWE‑176 (Improper Encoding), and it directly undermines the confidentiality and integrity of user sessions.

Affected Systems

The vulnerability affects all SonicWall SMA1000 appliances. No specific firmware versions are listed, so all current releases of the SMA1000 series should be considered at risk until a patch is applied.

Risk and Exploitability

The CVSS score of 7.2 indicates high severity, while an EPSS value below 1 % signals a low probability of widespread exploitation. The vulnerability is not yet listed in the CISA KEV catalog. The attack requires a malicious Unicode input designed to exploit the encoding flaw, and the attacker must already be authenticated via SSLVPN. Because the flaw directly bypasses the TOTP challenge, exploitation could lead to full session takeover if troubleshooting or administrative privileges are granted. The likely attack vector is remote authenticated—an attacker who can log into the SSLVPN can send the crafted Unicode payload and bypass the two‑factor step.

Generated by OpenCVE AI on April 13, 2026 at 21:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the SonicWall PSIRT portal for the latest firmware update that addresses Unicode handling in the SMA1000 series and apply the patch as soon as it is available.
  • Verify after upgrading that Workplace/Connect Tunnel TOTP authentication behaves correctly by attempting a test login with a valid OTP.
  • Monitor SSLVPN logs for anomalous login attempts that lack OTP confirmation, and investigate any instances where authentication succeeds without the expected TOTP prompt.
  • If an update is not yet available, temporarily disable TOTP enforcement for SSLVPN sessions or restrict access to the appliance until the vendor releases a remediation.

Generated by OpenCVE AI on April 13, 2026 at 21:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Title Bypass of TOTP Authentication via Unicode Exploit in SonicWall SMA1000 SSLVPN

Mon, 13 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Title Bypass of TOTP Authentication via Unicode Exploit in SonicWall SMA1000 SSLVPN

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Sonicwall
Sonicwall sma1000
Vendors & Products Sonicwall
Sonicwall sma1000

Thu, 09 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description Improper handling of Unicode encoding in SonicWall SMA1000 series appliances allows a remote authenticated SSLVPN user to bypass Workplace/Connect Tunnel TOTP authentication.
Weaknesses CWE-176
References

Subscriptions

Sonicwall Sma1000
cve-icon MITRE

Status: PUBLISHED

Assigner: sonicwall

Published:

Updated: 2026-04-13T18:26:18.229Z

Reserved: 2026-03-13T12:13:43.715Z

Link: CVE-2026-4116

cve-icon Vulnrichment

Updated: 2026-04-13T18:26:07.744Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-09T15:16:14.010

Modified: 2026-04-13T19:16:52.710

Link: CVE-2026-4116

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:36:56Z

Weaknesses