Multiple Vulnerabilities in SonicWall SMA1000 Products
Summary
CERT-FR issued advisory CERTFR-2026-AVI-0409 warning of four critical vulnerabilities (CVE-2026-4112 through CVE-2026-4116) in SonicWall SMA1000 secure mobile access products. Affected versions include 12.4.3-x prior to 12.4.3-03387 and 12.5.0-x prior to 12.5.0-02624. Successful exploitation could result in data confidentiality breaches, security policy bypass, and privilege escalation.
What changed
CERT-FR published security advisory warning of four vulnerabilities in SonicWall Secure Mobile Access (SMA1000) products. The vulnerabilities affect versions 12.4.3-x prior to 12.4.3-03387 and 12.5.0-x prior to 12.5.0-02624. Attackers could exploit these flaws to achieve data confidentiality breach, security policy bypass, or privilege escalation. Four CVEs are referenced: CVE-2026-4112, CVE-2026-4113, CVE-2026-4114, and CVE-2026-4116.
Organizations running affected SonicWall SMA1000 products face immediate security risk and should apply vendor patches from SonicWall PSIRT advisory SNWLID-2026-0003. Network administrators should prioritize patching internet-facing SMA devices given the privilege escalation and security bypass risks. CVE references are available at cve.org for detailed technical specifications.
What to do next
- Identify SonicWall SMA1000 installations in your network
- Apply vendor patches to update to version 12.4.3-03387 (for 12.4.3-x) or 12.5.0-02624 (for 12.5.0-x)
- Monitor for indicators of compromise related to CVE-2026-4112 through CVE-2026-4116
Archived snapshot
Apr 9, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
Premier Ministre S.G.D.S.N
Agence nationale
de la sécurité des
systèmes d'information
Paris, le 09 avril 2026 N° CERTFR-2026-AVI-0409 Affaire suivie par: CERT-FR
Avis du CERT-FR
Objet: Multiples vulnérabilités dans Sonicwall Secure Mobile Access
Gestion du document
| Référence | CERTFR-2026-AVI-0409 |
| Titre | Multiples vulnérabilités dans Sonicwall Secure Mobile Access |
| Date de la première version | 09 avril 2026 |
| Date de la dernière version | 09 avril 2026 |
| Source(s) | Bulletin de sécurité SonicWall SNWLID-2026-0003 du 08 avril 2026 |
Une gestion de version détaillée se trouve à la fin de ce document.
Risques
- Atteinte à la confidentialité des données
- Contournement de la politique de sécurité
- Élévation de privilèges
Systèmes affectés
- SMA1000 versions 12.4.3-x antérieures à 12.4.3-03387
- SMA1000 versions 12.5.0-x antérieures à 12.5.0-02624
Résumé
De multiples vulnérabilités ont été découvertes dans Sonicwall Secure Mobile Access. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Documentation
- Bulletin de sécurité SonicWall SNWLID-2026-0003 du 08 avril 2026
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2026-0003
- Référence CVE CVE-2026-4112
- https://www.cve.org/CVERecord?id=CVE-2026-4112
- Référence CVE CVE-2026-4113
- https://www.cve.org/CVERecord?id=CVE-2026-4113
- Référence CVE CVE-2026-4114
- https://www.cve.org/CVERecord?id=CVE-2026-4114
- Référence CVE CVE-2026-4116
- https://www.cve.org/CVERecord?id=CVE-2026-4116
Gestion détaillée du document
- le 09 avril 2026 Version initiale
Related changes
Get daily alerts for CERT-FR Security Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-FR.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CERT-FR Security Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.