Secure Mobile Access 100 10.2.2 Release Notes

Version 10.2.2.1

July 2025

About Secure Mobile Access

Secure Mobile Access (SMA) provides scalable, secure mobile access for your enterprise while blocking untrusted applications, WiFi pirates, and malware. SMA appliances provide a single gateway and a common user experience across all platforms, including managed and unmanaged devices. Traffic is encrypted using Secure Sockets Layer/Transport Layer Security (SSL/TLS) to protect it from unauthorized users.

SMA is available as a physical appliance or as a virtual appliance running on ESXi, Microsoft Hyper-V, Amazon Web Services (AWS), Azure, and KVM.

Compatibility and Installation Notes

  • Most popular browsers are supported, but Google Chrome is preferred for the real-time graphics display on the Dashboard.
  • A MySonicWall account is required.
  • SMA 10.2.2.3 is compatible with Capture Security Center (CSC).
  • CSC provides a cloud dashboard that displays the overall status of all the registered SMA appliances. The dashboard has sliders to choose the Time Period, Count of Alerts, Threats, WAF Threats, Authentications, VPN Accesses, Bookmark Access, Active devices and Users on a Map, and Threats categories.
  • Use your MySonicWall credentials to log into CSC at https://cloud.sonicwall.com.
  • Click the SMA tile to view the SMA Dashboard, complete registration, and enable cloud management.

SonicWall SMA 10.2.2.3 is supported on the following SonicWall appliances:

  • SMA 210/410
  • SMA 500v for ESXi

    • Supported for deployment on VMware ESXi 6.0 and higher
  • SMA 500v for HyperV

    • Supported for deployment on Hyper-V server version 2016 and 2019
  • SMA 500v for AWS
  • SMA 500v for Azure
  • SMA 500v for KVM.

What's New

This release provides the fixes for previously reported issues and the following enhancements.

  • Upgrade OpenSSL to version 3.
  • Integration of NetExtender client version 10.3.X.

Resolved Issues

This section provides a list of resolved issues in this release.

Issue ID Issue Description
SMA-4696 The Admin GUI freezes, and the new SSL VPN connection fails when the traffic to generate/renew the Let's Encrypt certificate is blocked.
SMA-5400 The syslog received from SMA shows logs with the source IP that are not detected correctly and conflict with other users.
SMA-5467 EPC check fails with client certificate.
SMA-5473 The SMA event log repeatedly outputs "Xn medium:(null), useMCD=1".
SMA-5503 Citrix Bookmark doesn’t work.
SMA-5513 Error accessing the Citrix desktop from the portal, and we get the error "Desktop could not be started"
SMA-5524 The Get domain attempt timeout problem is caused by a domain list that contains umlauts.
SMA-5525 Throw up an error after hitting bind, and the authentication setup process.
SMA-5528 The “Pie Chart” section is garbled in the Japanese SMA report.
SMA-5530 The sort function for 'Request Time' on the Device Management > Device page is not working correctly.
SMA-5559 The HTTP resource in the Portal bookmark logs the user out after a successful login when any sub-tab is clicked, as the session has expired.
SMA-5560 Garbled subject of Notification mail in Device Management.
SMA-5581 EPC check for the registry key HKEY_CURRENT_USER\Control Panel\Desktop\ScreenSaveTimeOut is not functioning correctly.
SMA-5583 The customer wants the option to display the default file share button showing all network resources for just an individual instead of portal-wide.
SMA-5589 NetExtender with WireGuard loses Internal access after 30 minutes, and a reboot of SMA fixes the issue.
SMA-5606 Client routes are missing while connecting with NetExtender Windows/Linux 10.3.0.
SMA-5614 SMA-1827: Error sending OTP via emails for LDAP users, Error sending One Time password.
SMA-5628 SMA-4966| Geo IP identification & remediation is broken with SMA 10.2.1.14, was fixed in SMA 10.2.1.13.
SMA-5637 When the NTP server is enabled, the system time differs by 2 minutes from the actual time, causing 2FA to fail.
SMA-5646 Post-upgrade the SMA to 10.2.1.14, the following error documentation_url_api shows up in VO & NX.
SMA-5687 The notification email sending history in device management is not output to the log.
SMA-5688 The launch NX option on Virtual Office does not detect 10.3.1 as NX clients and tries to install NX 10.2.341.
SMA-5694 Ftp download via bookmark fails with SMA 10.2.1.14.
SMA-5701 AD authentication fails with Windows Server 2025 when the password is set never to expire.
SMA-5736 Users can log in from multiple machines even though the device management is enabled with OEM.
SMA-5762 Unable to import the certificate and generate the Default Cert.
SMA-5763 SMA uptime status displaying incorrect value in GMS UI.
SMA-5775 Brute force attack on loginChangePass.
SMA-5801 Internal IP address as a log source when blocking the external IP address
SMA-5811 Stack-Based Buffer Overflow Vulnerability.
SMA-5812 Heap-Based Buffer Overflow Vulnerability.
SMA-5822 Reflected XSS (Cross-site Scripting) Vulnerability.
SMA-5826 Unexpected VPN Activity and Logging Inconsistencies on SMA 500 with Geo-IP Blocking Enabled.
SMA-5828 Unable to delete the old certificates that are not used anywhere, they are shown as pending.
SMA-5832 Src IP with multiple login failed are not blocked by brute force attack policy.
SMA-5874 The SAML configuration URLS are being truncated after character limit
SMA-5905 Post-authenticated arbitrary file upload vulnerability.

Known Issues

Not Applicable.

Additional References

This section provides a list of additional references in this release.

SMA-5659, SMA-5660, SMA-5699, SMA-5884, SMA-5917.