Lucene search

K
cve[email protected]CVE-2022-22275
HistoryApr 27, 2022 - 5:15 p.m.

CVE-2022-22275

2022-04-2717:15:07
CWE-400
web.nvd.nist.gov
56
2
cve-2022-22275
improper restriction
tcp communication
http
https
inbound traffic
wan
dmz
security policy
denial of service
dos
vulnerability

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

38.5%

Improper Restriction of TCP Communication Channel in HTTP/S inbound traffic from WAN to DMZ bypassing security policy until TCP handshake potentially resulting in Denial of Service (DoS) attack if a target host is vulnerable.

Affected configurations

NVD
Node
sonicwallsonicosRange7.0.0.07.0.1-5030-r2007
AND
sonicwallnsa_2650Match-
OR
sonicwallnsa_2700Match-
OR
sonicwallnsa_3650Match-
OR
sonicwallnsa_3700Match-
OR
sonicwallnsa_4650Match-
OR
sonicwallnsa_4700Match-
OR
sonicwallnsa_5650Match-
OR
sonicwallnsa_5700Match-
OR
sonicwallnsa_6650Match-
OR
sonicwallnsa_6700Match-
OR
sonicwallnsa_9250Match-
OR
sonicwallnsa_9450Match-
OR
sonicwallnsa_9650Match-
OR
sonicwallsoho_250Match-
OR
sonicwallsoho_250wMatch-
OR
sonicwalltz270Match-
OR
sonicwalltz270wMatch-
OR
sonicwalltz300Match-
OR
sonicwalltz300pMatch-
OR
sonicwalltz300wMatch-
OR
sonicwalltz350Match-
OR
sonicwalltz350wMatch-
OR
sonicwalltz370Match-
OR
sonicwalltz370wMatch-
OR
sonicwalltz400Match-
OR
sonicwalltz400wMatch-
OR
sonicwalltz470Match-
OR
sonicwalltz470wMatch-
OR
sonicwalltz500Match-
OR
sonicwalltz500wMatch-
OR
sonicwalltz570Match-
OR
sonicwalltz570pMatch-
OR
sonicwalltz570wMatch-
OR
sonicwalltz600Match-
OR
sonicwalltz600pMatch-
OR
sonicwalltz670Match-
Node
sonicwallsonicosRange7.0.0.07.0.1.0-5030-1391
AND
sonicwallnsv_10Match-
OR
sonicwallnsv_100Match-
OR
sonicwallnsv_200Match-
OR
sonicwallnsv_25Match-
OR
sonicwallnsv_270Match-
OR
sonicwallnsv_300Match-
OR
sonicwallnsv_400Match-
OR
sonicwallnsv_470Match-
OR
sonicwallnsv_50Match-
OR
sonicwallnsv_800Match-
OR
sonicwallnsv_870Match-
Node
sonicwallsonicosRange7.0.0.07.0.1-5030-r780
AND
sonicwallnssp_10700Match-
OR
sonicwallnssp_11700Match-
OR
sonicwallnssp_12400Match-
OR
sonicwallnssp_12800Match-
OR
sonicwallnssp_13700Match-

CNA Affected

[
  {
    "product": "SonicOS",
    "vendor": "SonicWall",
    "versions": [
      {
        "status": "affected",
        "version": "SonicOS Gen 7 TZ-Series 7.0.1-5030-R2007 and earlier versions."
      },
      {
        "status": "affected",
        "version": "SonicOS Gen 7 NSa-Series 7.0.1-5030-R2007 and earlier versions."
      },
      {
        "status": "affected",
        "version": "SonicOS Gen 7 NSv-Series 7.0.1.0-5030-1391 and earlier versions."
      },
      {
        "status": "affected",
        "version": "SonicOS Gen 7 NSsp-Series 7.0.1-5030-R780 and earlier versions."
      }
    ]
  }
]

Social References

More

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

38.5%

Related for CVE-2022-22275